Skip to main content

Full text of "Blacklisted! 411 - Volume 6, Issue 3"

See other formats




k~ "*■ "" tR 






Mso inside this issue: 

ackers ancUhe-Media 
i inU Manipulation 
tmrpster Diving 



This publication is dedicated to all of those before 
who built the foundation for the hackers of the world fn 
_gxpress themselves openly and without prejudice. 

While we attempt to continue in our quest to obtain 4 
knowledge and understanding, we Invite you, the readmt , 
to join in and share any thoughts you may have 
regarding the magazine, hacking, life, work and anything 
else that you feel Is important enough to be shared. 

We're not going to knock anyone down for asking 
questions or ridicule the steadfast elitist folks who 
believe that knowledge should not be shared. We believe 
knowledge should in fact be shared with one another, no 
matter how trivial the information may appear to be. 
After all, knowledge Is power. 

V Think back to the way It was, when hackers stuck 
/ together and had a good time. An amusing time when 
I hackers shared their stories of exploration and ultimate 
I conquest A wondrous time when hackers were 
[considered the good guys and looked up to by those not 
W fortunate enough to understand the technology around 
I them. A simple time when a hackers harmless efforts 
I gained a new understanding of technology issues and 
I the praise from their peers and superiors alike. 

J That time can still be NOW, Hackers of the world unite 
and exercise your freedom to disseminate information! 


ISSN 1082-2216 

» Copyright 1983-2004 by Syntel Vista, Inc. 

All opinions and views expressed in Blacklisted! 41 1 Magazine are those of the writers of the articles, and do not 
necessarily reflect the views or opinions of any Syntel Vista, Inc. staff members or it's editors. 

/ Blacklisted! 411 Magazine strongly supports the idea of Freedom of Speech, and will publish any article of 
I adequate quality. These articles will often contain materia! offensive to certain people. If you cannot handte this. 
[ please do not read the magazine. This information includes (but is not limited to): Information on the computer 
f underground and material relating to hacking, phreaking and other similar interests. Again, if this sort of thing 
I offends you, don't read the magazine, or at least don't read the articles which you find offensive. Our purpose is 
not to offend, but to educate. 

All rights reserved. No part of this material may be reproduced, stored in a retrieval system, or transmitted in any 
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written 
permission of Syntel Vista, Inc. 

Syntel Vista, Inc. 
P.O. Box 2506 
Cypress CA, 90630 


DBBL 01,07,32,41,52 


Inside this issue 

4 - Introduction 

5 - Letter from the editor 

If 6 - Letters and Comments 

12- Cloak & Dagger 

17 -The Ear 
'26 - Profiling 

30 - Hackers and the Media 

33 - The Black Market (Marketplace Classifieds) 

37 - The World of Vintage Computers 

40 - Amiga Resources 

41 - Hacker / Phreaker BBS Stings 

44 - Dumpster Diving 

46 - Serious Salvage Part III 

50 - The Timeline of the Mac Underground 

52 - Caught in the Blacklisted Web 

53 - Surplus Sources Part 3 

54 - Mind Manipulation & Mind Control Part 2 

58 - Monthly Meetings 

59 - Subscription Information 
59 - Back Issue Ordering 

Additional information 

How to Contact us: 

Blacklisted! 411 Magazine 
P.O. Box 2506 
Cypress, CA 90630 


$20 U.S., $24 Canada, $35 Foreign 
U.S. Funds only. 


Blacklisted! 41 1 Articles 

P.O. Box 2506, Cypress, CA 90630 

(Include name & address — we PA Y for articles) 


Blacklisted! 411 Letters 

P.O. Box 2506, Cypress, CA 90630 


Blacklisted! 411 Distribution 

P.O. Box 2506, Cypress, CA 90630 


Blacklisted! 411 Advertising 

P.O. Box 2506, Cypress, CA 90630 

Website: http://www.blacklisted41 1 .net 

Blacklisted! 411 introduction for those of you who are new. 

Who we are... and were... 

The question often arises on the subject of, "How did it all start?" 
in reference to our magazine and it's history. In response to this 
popular question, here is a quick history lesson of Blacklisted! 
411 magazine, including names, dates and little known facts 
which have, thus far, been hidden away for years... 

Blacklisted 411 magazine dates back to October 1983 with a 
group of friends from a Southern California high school that 
shared a common interest. We were all into our Atari computers, 
Commodore computers, electronics, sciences, arcade games, 
etc. We built projects, hacked into this n' that, came up with 
grand ideas and tried to make them into some sort of reality. The 
group started a monthly hackers "disk magazine" (an early form 
of what is now known as an e-zine) called "Blacklisted 411, the 
hackers monthly". This may sound strange today but circulating 
information on disk was the best way to get it out without all the 
cool toys of today. We didn't have the internet to send it out, and 
no one had printers that could print anything other than plain text 
(and didn't even do that welt). With a disk based system we 
could send text files, primitive graphics/pictures, and utilities 
more easily and it could be copied by anyone who had a 
compatible computer. At our peak we distributed 150 disk copies 
<per month> of the disk magazine, though there is no way to 
know how many were copied by others. 

Eventually modems caught on and we began to distribute the 
monthly via crude BBS systems. Using the power of a 
Commodore 64, we put up a Blacklisted! 411 info site, which 
anyone could log into without handle or password. It was a 
completely open message center. Using X-modem or Punter file 
transfer protocols, you could download the latest Blacklisted! 
411 files or read/leave "messages" which later became known 
as a "message base" and has evolved into what are now 
commonly known as "newsgroup postings" or "forum postings". 
We had only one message center, no email capability & only 1 
phone line. Primitive, indeed. Effective, however. 

Around 1984 we purchased a 9 pin dot matrix printer that could 
<gasp> print basic graphics. We experimented with printing out 
copies of the Blacklisted 411 monthly and copying them at the 
media center at the high school. The media center staff 
graciously allowed us to make these copies free of charge which 
was very cool at the time. We'd pass these out at the local "copy 
meets" (an interesting phenomenon of past times - hordes of 
computer users would meet at a predetermined location and 
setup their computers with the sole purpose of copying software 
and exchanging this software with each other). We'd leave a pile 
of our magazine copies anywhere we were allowed to do so. 
One popular location was next to the Atari Gauntlet and Gauntlet 
II arcade games strategically located at 7-1 1's all over the place. 
We're only guessing here, but we think people photocopied our 
copies and then those were photocopied, etc. There's no telling 
just how many generations of early printouts of Blacklisted! 411 
monthly made it out there. 

Years went by and Blacklisted! 411 evolved. The short life-span 
of the printouts was both a great success and a miserable 
failure. No matter where we left them, they were taken - and 
taken quickly! The feedback was awesome in that people 
wanted more. The interest was very high, but our inability to 
meet this growing demand was completely overlooked. We had 
to officially pull the plug on the printout experiment and we stuck 
with electronic files. It was really the easiest way to go. The 
Blacklisted! 411 info site grew into a 2-line system. This was a 
big deal in 1985. By that time, information was almost 
exclusively passed around by modem (unofficially on paper) and 
we were still releasing disks at this time. 

June of 1987 marked the end of Blacklisted! 411, the hackers 
monthly. Our last disk based magazine was distributed that 
month. Now that all of us were out of high school and onto 
college, work and the bigger/better things in life, nobody had the 
time or inclination to put any effort into the disk based magazine 
anymore. The once thriving Blacklisted! 411 group broke up and 
people went their separate ways. Naturally, we ail assumed this 
was the end and Blacklisted! 411 would never come back in any 

In the summer of 1993, one member (and the original editor-in- 

chief), Zack Blackstone, felt it was time to revive the Blacklisted! 
411 concept, but this time do it as a print magazine. It was 
extremely difficult to get started because the group was no more. 
He was the only one of the original group members remaining 
that had an interest in bringing the hacker group and magazine 
alive again. With some money, will to make it happen, and with 
the help of some top of the line (at the time) computer gear and 
page layout software Blacklisted! 411 was reborn. Blacklisted! 
411 Volume 1 , Issue 1 was released in January 1 994 
Blacklisted! 411 was finally BACK. The issues were released 
monthly and distribution was small. After a year passed, it was 
decided to try a quarterly format in an effort to increase 
distribution. During that year Zack managed to get in contact 
with many of the old group members and they are now active 
staff members once again. 

In 1999, we published what was to be our last issue of 
Blacklisted! 411 (Volume 5, issue 4) for many years to come. 
We didn't know it at the time, but many pitfalls would ultimately 
cause the demise of the magazine. After 4 years of regrouping 
and planning, Blacklisted! 411 magazine is back in print form 
again. We are one of the oldest group of hackers still remaining 
and releasing gathered and compiled information within the 
hacker community and the mainstream community as well. We 
still have the same hacker mentality and code of ethics from the 
80's. Hackers are not thieves - they're curious people. We are 
not elitist hackers by no means and no question is a stupid 
question. We're not going to knock you down, call you a "lamer" 
"lamah" or give you crap for being a newbie! Every hacker 
started somewhere. We remember this most fundamental fact 
and we will never forget it. 

What's Next... 


Over the next few months a lot will be happening. We are 
becoming more active in the Hacker Community. As we are 
based in the Los Angeles area, we are building relationships 
with the local Hacker groups such as LA2600, SD2600, 
twentythreedotorg, Irvine Underground and more. We will be 
attending and sponsoring Hacker Conventions and Conferences. 
The first being the Layer One Convention, June 12-13, at the LA 
Airport Westin. We will have a booth at this event where we will 
be selling subscriptions, current and back issues of the 
magazine, and other swag. We will also be having several 
"convention only" promotions so look for us there. 

Magazine Development 

A major effort is being made to increase our exposure to the 
Hacking and Information Security Community. Our distribution 
goals are for the magazine to break 100K copies distributed 
each quarter sometime next year. Based on the demand, and 
orders from distributors we are on the right path. We are seeking 
and hiring freelance writers, photographers, and editors to 
increase the quality and scope of the magazine. Additionally, we 
have people who are actively trying to promote the magazine 
both inside and outside of our close community. 

Merchandising / SWAG 

We wish to have a whole series of Blacklisted! 411 themed swag 
and merchandise. This includes stickers, apparel, posters, and 
whatever else our creative minds can come up with. Input, help, 
and direct submissions for this will be accepted and appreciated. 


Blacklisted! 411 is run by real people who care about other 
things aside from hacking. No, really. In the spirit of helping 
people and organizations outside of our community, Blacklisted! 
411 Magazine has officially donated to the local chapter of the 
Ronald McDonald House charity. After all, children are our 
future. Blacklisted! 411 Magazine wholeheartedly supports the 
Ronald McDonald House mission and their programs. 
Additionally, we've donated heavily to the Westminster Parish 
Festival, specifically with the intent to help support their youth 
programs and special classes for the mentally and physically 

If you have questions, comments, articles, ideas, flames, general 
"screw you guyz" messages or wish to offer support in some 
way, please contact us immediately and let's see what we can 
do. Thanks for your support, hackers! BL411 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

Letter from Zachary Blackstone, editor-in-chief. . 

Welcome to another issue of Blacklisted! 411 Magazine. 

We're now to our Summer 2004 issue and things seem to be 
running along somewhat smooth. We've had our share of obstacles 
to overcome since our return issue in the Winter 2003/2004, but 
we're plugging along and things just keep getting better. Our 
distribution numbers are growing at an incredible rate which is a 
good thing as long as we can meet the challenge. Fortunately, we 
can. If not already, you'll soon be able to find Blacklisted! 411 in 
the same places as before plus an entirely new group of locations 
we never managed to get a grasp on previously. 

With our comeback issue, Volume 6, Issue 1, distribution was 

large, but somewhat confined which made location of the magazine 

difficult in various areas in the U.S. with some stores carrying 

dozens of copies while others having none to speak of. The Spring 

release, while much higher in distribution numbers, appears to have 

suffered some of the same issues due to a sporadic distribution 

network. Our Summer release should mark the end of any 

questionable distribution chain and begin with an even distribution Shouts for this issue go out to 

among the stores who carry our title. 

Our website is online! No, really. We offer a store where 
subscriptions and back issues may be purchased. There's a FAQ 
section which answers most of the common questions. We have an 
"about us" section which gives a brief history of our outfit and our 
plans for the future. The site also has a contact form for submission 
of articles and questions. Check out our website at the following 

www.blacklisted41 1 .net 

Since we're pretty much the only wide distribution hacker 
magazine in the world which offers display advertising, we've 
received quite a bit of feedback and requests from prospective 
advertisers since our comeback issue. In trying to accommodate 
the majority of these requests, we're going to start offering inside 
cover (both inside front cover and inside back cover) ad space IN 
COLOR. If interested, get your ad-space requests in ASAP 
because once the space is spoken for, you may have to wait 

It's been three issues now and a lot has been going on for all of us 
over here at Blacklisted! 411. We're all excited about the recent 
developments, namely in distribution numbers and the string of 
writers we've picked up. If you're a writer (or interested in 
becoming one) and you have a knack for the hacker mindset or 
lifestyle, send in your material. We're still looking for good 
material from anyone who has the time and inspiration to write. 

If you're an artist, have samples and would like to make some 
money, get in touch with us. We're still looking for people to fill 
the gap when it comes to artwork. We'll consider freehand artwork 
as well as computer graphics art. We'd like to keep the magazine 
fresh for everyone. 

Don't forget that we have some hacker conventions coming up real 
soon. This is probably the best way for hackers in different regions 
to meet each other face to face and have a good time. In fact, 
they're somewhat reminiscent of the BBS user meets of the early 
80's through the mid 90's. If you were around to witness those, 
imagine something much bigger and a whole lot better organized 
and you have yourself a hacker convention. 

LayerOne will be in Los Angeles, CA June 1 2th and 1 3th at the Los 
Angeles Airport Westin. 

Defcon will be in Las Vegas July 31st through August 1st at the 
Alexis Park Hotel & Resort. 

Both will be worth your time, so go! 

We're already gearing up for both of these conventions, so expect 
to see us there with convention specials you won't find anywhere 

To find out more about the conventions, go to the following URLs: 

www.layerone. info 

I know I mentioned it in the last issue, but the name of the game is 
referrals. So, in keeping with the idea, here's another mention. 

Vince Briel (of Briel Computers) - Awesome job on the Apple I 
replica, man. We all love what you're doing. Can't wait to get 

Ole Buzzard - been looking for you. Where are you? If anyone 
knows where he is, can you let him know we're looking for him? 

Spratt_ ( - Excellent work on the website! 
Thanks a billion. 

Ender Wiggen - Glad to see you around again. Hope to see new 
material from you soon!!! 

....and, of course, the usual gang: Freaky, blackwave, Dark 
Tangent, Doc Jones, Goldfmger, Big Dog, TechnoHeap, WizGuru, 
etc... Thank you SO much for all the help and referrals. Without 
you guys rounding people up for us and providing great material, 
work would be much harder. Thanks again. 

I also have to mention that a large number of people who are too 
many to list have been stepping up and offering help in just about 
every area of the magazine - a big THANK YOU to all of you! 

So many contacts from hackers all over the world every day has 
been keeping us on our toes. Love it, so keep it up. Some of you 
surprised us with your great ideas and we look forward to making 
use of those ideas. If you have some crazy, unusual or fresh idea 
you think we can use to benefit the magazine and hacker 
community, please contact us. 

We have a lot of comedians out there, too. Namely, the untold 
number of people asking, "How do I make a redbox?" It's been an 
ongoing joke for years and I'm both surprised and glad people still 
remember the comedy surrounding the topic. Thanks for the laugh, 

In closing, if you want to get in touch with us for any reason, do it. 

Blacklisted! 411 Magazine 
P.O. Box 2506 
Cypress, CA 90630 

Notes of interest: 

■ We currently have all of Volume 1 back issues available at this time. 

Volume 5, Issue 3 and Volume 5, Issue 4 is still available in very limited quantity. 

■ We're no longer offering any t-sbirts, baseball caps or bumper stickers, but we're accepting design ideas for new swag. 

■ Deadline on all articles, letters, artwork and ads for Volume 6, Issue 4 is August 21st, 2004. 

■ ALL classified ads are now FREE and are limited to space constraints per issue. First come, first served. 

■ We're a PAYING MARKET for articles we use! We pay $25-5600 depending on size, quality & use of photos. 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 

Letters and comments from our readers. 

Blacklisted! 411, 

Hello Guys. I've been a die hard reader of your magazine 
since the early days. I'm glad to see you back after your 
short absence. You have no idea how much myself and 
everyone else in the scene have missed you. The color 
cover is a nice touch, too! I was wondering if you had a good 
ANAC for the Riverside, CA area (SBC - 909)? I need one 
fast. I tried 1 1 1 and 1 14 from the hack FAQ, but no luck cuz 
they suck. You guys always seem to be on top of updated 
info, so hurry up already. 


Mira Loma, CA 

Routed: Internet 

Hey Skyfox, we can help you out. You happen to be in our 
neck of the woods, so we're right on top of it. And the 
answer is: 959-1122. I just double checked and the ANAC 
works fine. Give it a shot. Hope that helps. 

Blacklisted! 411, 

Hey guys, good to see you back. So, uh, how do I make a 
red box? Just kidding. Yuk yuk.. Anyhow I'm building 
<another> project for use with the telephone system. It's 
going to be a call diverter, but much more sophisticated. So, 
I'll require some information I hope you can help me out with. 
I know this is available on the internet, but i want the final 
word from you before I dive in. I need to know the 
frequencies for the following so I can make my box top notch: 
dial tone, ring tone and busy tone. Hope you can help. I'm 
also in need of a speech chip like the digitalker or something 
similar. Do you know where I can get them? 


Pueblo, CO 

Routed: U.S. Snail Mall 

Frigid, this is an easy one. I was hoping for something a little 
more difficult, especially coming from you. Ok, so here we 
go. Dial tone: 350Hz/440Hz, ring tone: 440Hz/480Hz, busy 
tone: 480Hz/620Hz (half sec duty cycle). As for the 
Digitalker, a couple of years back I would have suggested 
Jameco because they had a huge stock of them. However, 
they often dump off their slow-selling items as they did with 
this particular item. So, why don't you try G.I. Electronics 
( Just checked with them and they 
have them in stock along with all the support chips. In fact, 
they have a really large selection of older speech chips. In 
case you decide to alter your design. Anyhow, we can't watt 
to see your new creation. Keep us in the know. For anyone 
who doesn't remember Frigid, he's the one that made the 
clip-on tone grabber with speech output. Nice stuff! 

Blacklisted! 411, 

Yol Dudez. I keep hearing about ANAC's all the time and I 
know it's a stupid question, but WTF are ANAC's? YKWIM? 
How can I use them and what will I gain from their use? 

South3rn One 

Orlando, FL 

Routed: Internet 

Yeah, we know what you mean. ANAC stands for "Automatic 
Number Announcement Circuit". I bet you're winking, "yeah, 
so what the heck does that mean?" I'll tell you. An ANAC is 
a number (Anywhere from 3 to 10 digits in length) you can 
dial directly from your phone and once you do this the 
number you dialed from is repeated (or announced) back to 
you (with a voice). This is really useful if you're digging 
through a panel with dozens of phone lines and you need to 
identify a single (or multiple) wire pairfs). 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411, 

Welcome back from the dead. I've been meaning to ask you 
about Tempest and wanted to know if you could give me a 
brief run down and any useful information on the topic. 
Thanks guys. 

Hard Sector 

Pittsburgh, PA 

Routed: Internet 

Greetings Hard Sector. If you're asking about the arcade 

game "Tempest" it was a vector graphics game made by 

Atariin 1980. It's one of the most collected games of all time, 
in fact. Pretty cool game. I'm going to bet you're asking 
about the "other" TEMPEST, however. TEMPEST stands for 
Transient Electromagnetic Pulse Surveillance. Electronic 
equipment emits electromagnetic interference into their 
sunoundings. These emissions can be intercepted and 
deciphered using special monitoring equipment up to a mile 
or so away. Oh yes. This can be prevented by properly 
shielding the electronic equipment to eliminate the emissions. 
However, I'd like to note that it's illegal in the U.S. for any 
civilian to possess or use Tempest equipment. To find out 
more about mis topic, please read the Tempest article in this 
issue of Blacklisted! 411. Interesting stuff. 

Blacklisted! 411, 

This is the first time I have ever seen or read your magazine. 
I found the latest issue at my local newsstand. The name 
caught my eye. I have to say that this little magazine is 
probably the best piece of gold I've ever bought from my 
newsstand. I've never considered myself a hacker and 
always thought that hackers (before now) were supposed to 
be the equivalent of cyber-criminals or what have you. The 
media really had ME going all this time with their 
misinformation. I had no idea a hacker "community" existed 
in any capacity until I picked up your magazine. What I take 
from it is that hackers are mostly technology enthusiasts, to 
put in into simple terms. I can easily understand this and 
relate on some level. 

I'm really excited about what you're doing and what you 
stand for. Yes, as a new reader having absolutely no bias 
towards hacking, I completely understand your position and it 
makes a lot of sense to me. I'm inclined to become involved 
on some level, if only being a steady reader. Maybe I could 
be a closet-hacker or the like. Who knows. Count me in, 

The article on War Driving was extremely interesting to me 
and really opened up my eyes about how open wireless 
home networks are. Sure enough, I found no less than three 
open networks in my own neighborhood, walking around with 
my laptop. Wowl I also found the Hidden Sounds article 
somewhat enlightening as with the Women Hackers article. 
I'm really floored about all the information I was hit with and 
it's all excellent material. I'm not really one to hold onto past 
issues of magazines, but you can count on me never letting 
go of this onel 

In addition, I'd like to commend you on your unconventional 
attitude and handling of your readers comments. I'm greatly 
affected by your magazine. From the look all the way down 
to the words. Excellent. 

I'm a child of the Nintendo age and used to play around with 
electronics when I was in high school. I even took the 
electronics classes offered there. It was sort of "the thing" at 
the time and I went along for the ride because I thought it 
was an easy class. I quickly found that the class was actually 
difficult for me, yet I was drawn in. Everything about it was 
interesting to me, but I never went anywhere with it once I 
was out of high school. Since then, I've toyed with the idea 

Blacklisted! 411 

of getting into electronics, but never had any reason to until 

I don't know why exactly, but I'm somewhat compelled to get 
back into electronics after reading your magazine. I'm 
definitely going to investigate some of these topics a little bit 
more and try my hand at building something. Thanks for the 
push. I desperately needed it. 

I would like to offer this letter as a testament of your success 
in getting the word out and explaining yourselves. I'm quite 
impressed with your well-worded articles, the clean look of 
your magazine and what you're all about. I'd like to join up 
and consider myself a hacker, at heart at least. Thank you 
for the good read and keep it up. 

Jake G. 

Burbank, CA 

Routed: Internet 

Welcome aboard, Jake. It looks like we've done our job. 
We're always happy to see someone new getting excited 
about hacking and understanding the whole concept of what 
we're about and what we're not about more importantly. It's 
a big plus when we can take credit for bringing in new blood, 
so to speak. Each and every "newbie" who joins in the 
hacker ideal brings with him (or her) a wide array of talents 
and ideas to maintain and further explore the concept of 
hacking. Even if the newbie has no idea how to hack or what 
aspect of hacking they're interested in most, we completely 
support their curiosity and offer our guidance whenever 

You said it, man. The media has everyone psyched into 
thinking hackers are criminals. As you figured out with a little 
direction, hackers are not criminals Not by any means. End 
of story. Curiosity really scares people. Particularly, when 
they don't understand what they're seeing and are constantly 
told the same thing over and over again. 

We think it's a great idea to get back into electronics. It's the 
foundation of most hackers today. So many of us grew up in 
the Atari age or the Nintendo age, playing with electronics 
and/or computers and eventually moved into technology 
related fields later in life. It's the hacker mentality which 
makes todays technology viable and interesting. 

Thank you for the kind words on our magazine and the 
articles contained within. We appreciate it. If you ever have 
any questions or need any direction, please feel free to let us 
know. As always, we're thrilled to help anyone in need. 
Again, welcome to the hacking scene, Jake. It's nice to have 
you with us. 

Blacklisted! 411, 

I just picked up a copy of your magazine and love it! I 
checked out your site and read a little bit about you guys 
while I was there. I'm very impressed with the whole 
package, guys. You all seem to be so far ahead of the game 
already. I'm really impressed with your eagerness to help 
new recruits and believe this will set you very far above the 
rest. This is a difficult trait to find with old school hackers 
anymore. They seem to be rude, too busy or completely out 
of the scene. Good job, Blacklisted! 411. I've been dealing 
with this "elite" crap far too long and I'm sick of it. I'm so 
damn glad you're around now. I'm going to fly under the 
Blacklisted! banner from now on as I truly believe in your 
philosophy and ideals. I don't have any questions, just 
wanted to greet you and let you know I'm with ya! Feel free 
to print this if you want. L8rs 

ZerO ZerO 
Los Angeles, CA 
Routed: Internet 

Thanks for the greets ZerO ZerO. It's always nice to hear 
from a supporter of the cause. 

Blacklisted! 411, 

New reader, happy to see you in print. I have a quick 
question for you. I have some old 46/49Mhz cordless phones 
and I need an idea of the possible frequencies these units 
cover, unmodified. Can you help me with this? I know it's 
like really old tech, but you seem to have it together. Thanks 
in advance. 


Allen, TX 

Routed: Internet 

Sure we can help. We have tons of information on 
frequencies filed away. In your case, here's the full 
frequency list for the older first and second generation 
46/49Mhz cordless phones: 


















































































Please note ffiar channels 16-25 used to be channels 1-10 
years ago before additional channels were added in. Hope 
this infomiation helps you out 

Blacklisted! 411, 

I think it's cool you guys are back. I'm totally into arcade 
games now and it's all because of you guys. I found out how 
to get them cheap and even learned quite a bit on how to 
repair them. I never knew you could go out and buy these 
things until I read about it in your magazine. Thanks. My 
wife thanks you too (sarcasm - heh heh) Anyhow, on to why 
I'm writing you. I've been looking everywhere for a book 
which covers older RAM, ROM, PROM and EPROM memory 
devices, with cross reference information and pinouts. I've 
asked EVERYONE else and nobody seems to know if such a 
book even exists, let alone how to direct me. I know you can 
help, don't let me down. 

Scott D. 

San Dimas, CA 

Routed: Internet 

You're in luck. You need the following book: 

Up to Date Memory Data & Comparison Tables 

ISBN: 981-214-265-7 

by Tech Publications Limited. 

10, Jalan Besar, #B1-39 Sim Lim Tower, Singapore 0820 

Tel: 2914595 

Fax: 2991550 

This littfe book will thrill you to death. Trust me on this one. 
Bursting with tons of cross reference data, this book is simply 
a MUST GET, hands down. This book covers, static ram, 
bipolar ram, cache address comparitors, dynamic ram, prom, 
register prom, eprom, eeprom, video ram, serial ram, ram 
modules, ete. Awesome book! I have no other 
recommendations on this topic as the above book sets the 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 

standard. If you're smart, you'll get two of them and keep 
one in a safe place. Enjoy. 

Blacklisted! 411, 

I've just picked up my fourth issue of Blacklisted and it's great 
one of the best mags I've read yet. Anyway I have some 
questions for you guys. I hope you guys wont think they're 
dumb or stupid but I'm just getting started in hacking, 
phreaking etc... 

1) In the April issue of 98 you've got the kool pcrtures and I 
would like to know what that phone thing is the telephone 
repair guys carry its also in the pile with all that other stuff. 

2) Where can I get it. 

3) What's the deal with frequencies and scanners? 

4) What s a red box and can you send me some instructions 
on how to build it or tell me were I can get instructions 

5) Also what's with crystals? 

6) Last question. In Terminator 2 Judgement Day what was 
that thing he put into the money machine and where can I 

find it. 

P.S. I really appreciate all your help and thanks for taking the 
time to read this. I'll defientiy be subscribing. 

J. Conley 

Whiting, IN 

Routed> U.S. Snail Mail 

Welcome newbie. Let's answer your questions by the 

1. I'm not sure which phone thing you are referring to. 
Them are two obvious phone items in the picture you 
mention. On the top left of the picture is a Harris 
Model TS22 Unemans Testset and on the top right is 
a Progressive Electronics Model 10OA Tone 

2. If you want either of these, by one of the following 
companies (ask them for a catalog, at least) 

Jensen Tools 
http://www.jensentools. com 

Parts Express 

http://www. parts-express, com 

Contact East 
httpJ/www. contacteast com 

MCM Electronics 


3. Frequencies are useful to hackers in many ways. 
Wireless units operate on certain frequencies. 
Scanners allow anyone to monitor those frequencies. 
I'm sure you can see why and how that is important. 

4. Red Box. I knew this one was coming, (smile) A Red 
Box is a device the one can use to defraud the phone 
company by fooling a pay phone into believing coins 
have been inserted when in fact only some tones were 
produced and directed into the mouthpiece of the 
payphone. Red Boxes do not seem to worit as often 
as they used to. The phone companies are getting 
wise in their old age - somewhat, anyhow - and they're 


replacing old pay phone equipment which have this 
fatal loophole with new machines which will not allow 
Red Boxes to fool them. 

You can get the instructions anywhere. The internet, 2600, 
back issues of Blacklisted! 411, THUD magazine, etc. But I 
will answer this question with a super quick response. Buy a 
Radio Shack programmable memory dialer. Take it apart. 
Replace the crystal inside with a 6.5536 MHz (or 6.50MHz, 
depending on what school of thought you subscribe to). Put 
back together. Program one memory with five stars (the * 
key). This is your red box. Cheap, doesn't wori< that great 
because tolerances are way off, but it's a Red Box. Use of 
mis is illegal and should not be done, of course. Also, buy 
back issues of Blacklisted! 411 and read up on mis. 

5. Crystals. An electronic component which is used in 
oscillator circuits to create frequencies of specific 

6. The thing in Terminator II you speak of is a small 
Apple computer attached to some wires and a card. 
It's a fantasy device which will not work in the fashion 
they portray in the movie. But it sure looks cool. Then 
again, I recall an ad. in one of the other hacker mags 
or hacker catalogs that describe the device "a la 
Terminator 2" or something like mat. Still, I cannot see 
any way the device can do as it is portrayed. 

Blacklisted 411, 

Nice to see you guys back again. The Mac Spoofing article 
you guys did way back in 1 998 is what got me hooked on 
your magazine but you weren't around much longer after 
that. That's ok, crap happens and now you're back. 
Speaking of which, I about crapped my pants when I saw 
Volume 6, issue 1 sitting on the shelf of the magazine rack. 
Naturally, I had to grab it, knocking someone out of the way 
to get to it. :-) 

I took the time to check out your website — good job! I'm 
impressed with your comeback. You seem to have it all tied 
up and everything back together again I've been dabbling in 
electronics for the last few years and have made a lot of 
headway so far. I want to further this experience and hope 
you can help. Will you be offering any build projects or any 
pointers on manufacturing circuit boards, soldering, etc? 
Hope you guys are around for the long haul. Missed you. 


Tampa Bay, FL 

Routed: U.S. Snail Mail 

Thanks tor the welcome back. It was a long time coming, but 
we're back and plan to stick around. We're also planning on 
having some projects in an upcoming issue, so stay tuned. 
Congrats on getting into electronics. It's fun stuff. 

Blacklisted! 411, 

I'm a new reader of your magazine. I picked up a copy at the 
TRW swapmeet and now I'm glad I did. I had no idea what I 
had picked up at the time until I got home and flipped through 
the pages. I'm astonished as to what I've been missing out 
on all these years. I'm a hard core electronics enthusiast 
with a considerable background in computer technology. I 
must have been living in a plastic bubble because I had no 
idea about the hacker subculture. From what I've read, I'm 
very fascinated with your take on the hacking world and what 
it's all about. The similarities to the electronics "groups" of 
the 80's are obvious if not related directly 

I'm amazed by the information you've presented and would 
like to comment on some of the material. I like your style, the 
articles themselves and your somewhat light hearted 
approach. I feel that you're providing a clean, open 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

environment for people to offer their ideas and exchange 
information with each other. I can see what target group of 
readers you're trying to appeal to and I think you're doing a 
great job of it. Hell, I've never been interested in hacking, but 
here I am now after reading a copy of your magazine. That 
has to say something. 

I'd like to see more projects or how-to's in your magazine. I 
think it would be an asset for the serious hackers who want to 
dig in a little more. Being so far into in electronics as I am, 
I'm interested in constructing some equipment which can be 
used for hacking in some way and then sharing those ideas 
and plans with others. 

I've found over the years that the number of electronics 
enthusiasts have dwindled and our ranks are nearly beat 
down to make way for the disposable-tech. I'm 
unquestionably enthused to have found your little magazine 
and hope to exchange information with you and your other 
readers. I think what you're doing is very inspirational. 
Expect to hear more from me later. Thanks for the good 

George H. 

Northridge, CA 

Routed: Internet 

Welcome to the party, George. Our comeback and the 
subsequent response has been nothing less than 
phenomenal . We're glad you took the time to make your 
presence known and offer your comments. We're interested 
in offering more how-to's and project articles sometime soon. 
We realize that the hardcore hackers and hardcore electronic 
enthusiasts have just about everything in common. Thanks 
for the kind words and your thoughts. We look forward to 
hearing from you again. 

Blacklisted! 411, 

You guys always seem to know where to find everything, no 
matter how old or strange that item may be. I'm looking for 
something I bet you can find for me. I am in need of a few 
manuals for some Data IO programmers. You're always 
talking about them, so I figured you'd know where to find 


Burlington, VT 

Routed: Internet 

Ah, this is an easy one. First, you have to check eBay. 
That's a no brainer. If you can't find it mere, check these 

Manuals Plus, 100's of thousands of manuals, (801) 882- 

Ed Matsuda, HP & Tek, good quality, fast delivery, great 
prices, (619) 479-0225. 

Manual Merchant, (619) 490-9076, 

FAX 490-9075, 

Susan, HP, Tek, Fluke, about 10,000 manuals, (800) 435- 

Bob Garcia, Tek & Racal, about $35 each, (770) 977-5701. 

Bob Lee, Tek, (503) 774-6560. 

Deane Kidd, Tek, (503) 625-7363. 

Art May, Military connections, (503) 632-6973. 

Tektronix (800) 426-2200. 

Wavetek (800)622-5515. 

Unless you specify the exact model of the equipment you 
need a manual for, you're going to have trouble finding it. Be 
sure to provide this information to whomever you ask. 
Photocopies are available on the older "obsolete" models if 
you look around in the newgroups. If you don't mind PDF's, 
try This is a cool site with information on 
obsolete equipment, computers and electronics. Specifically, 
you will need to go to: 

httpJ/bitsavers. org/pdf/datalO/ 

They have PDF scans of System 19 and 29B units as well as 
the Unipak, Unipak2 and Unipak2B. Good luck and let us 
know if we can find something else for you. 

Blacklisted! 411, 

I'm need some help guys. I've been interested in finding 
more surplus electronics I can purchase for low prices. Most 
of the electronics stores around my area are either gone or 
have slimmed down their product line to the point where they 
are no longer useful to me. Can you guide me? Thanx. 

Lord Soth 

San Diego, CA 

Routed: Internet 

Sure we can help you on this one. First, check out the 
Serious Salvage Part II article on page 46 of this issue and 
the first part in the last issue. They're both great sources for 
parts. Also check out the Surplus Sources article in the last 
issue on page 40 and 55 of this issue. There are a lot of 
great sources listed there. Last, you have to visit the 
following place because they're so close to you: 

California Electronic & Industrial Supply 

221 N. Johnson 

El Cajon, CA 92020 

Tel: (619)588-5599 

Fax: (619)588-0371 

Toll Free (866)CAL-ELEC 


Ebay ID: calelectron 

They sell on ebay, have a nice big place full of surplus 
electronics and they will deal. If they have something you 
want, start negotiations off at 10% of their asking price and 
work your way up. We've been buying stuff from this place 
since before we started up Blacklisted! 411. They've been 
around a long time and they're probably going to stay around 
even longer. 

Blacklisted! 411, 

Congratulations on your return. Not so much of a question 
letter but more of a series of comments and suggestions. 

Someone asked about a 2-80 emulator to use for diagnostics 
some time back. I know it's old news, but I thought it would 
be nice to follow up on the subject and offer an alternative to 
the equipment you suggested. Applied Microsystems made 
the EM-180/180B Diagnostic Emulator for the Z-80. It's a 
great little device and it's not very expensive in the surplus 
circles. It's even somewhat cheap on ebay as well. Check it 

The hacking scene has changed a lot while you guys were on 
hiatus. Namely, the internet has grown, allowing all of us to 
get together and congregate much easier. We all have our 
regular online haunts, usually in the form of hacking forums 
and local hacker meets. There's also a lot of new blood in 
the hacking scene as well. Under your original discipline of 
bringing in "noobs", we now have a huge following of people 
who may not yet be hackers, but want to become hackers. 
You guys did a great job of getting the ball rolling on this 
subject with a resulting legion of technical dudes ready to act. 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


Your return couldn't have boon better timed than it has 
because this abrupt expansion of the hacker population has 
produced a very serious need for more material and fresh 
ideas with a different perspective, without all of the political 
garbage we have long endured from the alternative hacker 
sources in your absence. Hell! It's nice to see you back! 

Luckily, you've always been less politics and more hardcore 
information which we all appreciate. Please keep in mind 
when releasing new issues that we have a lot more noobs 
out there than ever before and they're all dying to understand 
everything. If you keep with this crowd and cultivate them as 
you always have, you'll go far. 

I know you guys probably already know all of this, but it's 
been so long since we've seen you and the shit material 
coming from everyone else has been flowing too long for me 
to ignore it. Volume 6, Issue 1 was an excellent coming back 
issue and we're all hopeful you stay on the same path you're 
on. Please know that we're all happy as shit you're back. 


Los Angeles, CA 
Routed: Internet 

Hey n3g8. Nice to hear from you after all these years. Yeah, 
we know how much the "scene" has changed over the years. 
We've been sitting on the sidelines awaiting the perfect time 
to come back. We noticed the increase in the hacker 
community as well. It's no accident we came back when we 
did. Anyhow, thanks for the comments and we got the twist 
of your letter. We'll keep our eyes on the ball and stir things 
up a little bit. 

We'll never lose sight of the newbie league and make sure 
we offer material they can swallow. As always, we all had to 
start somewhere and we were all newbies at some point in 
time. Yeah, even the elite folks were newbies once upon a 
time, to their dismay. We provide a lot of material with the 
newbie in mind. Doesn't everyone? :-) 

We've always hied to keep out of the politics and stick to the 
tech material as much as possible, although it's easy to cover 
politics-laden subjects when so many hacker topics tend to 
be wrapped in some son* of new political law-making frenzy. 
So, we do plan to offer more great material for everyone to 
enjoy, so keep your eyes peeled. If you have any specific 
subject matter you 'd like us to cover, please let us know. We 
have a spectacular line-up of writers and they're always 
looking for ideas on subjects to take on, so it's no trouble. 

Blacklisted! 411, 

I'm interested in doing a report on movies related to hackii 
or rather Hollywood's interpretation of hacking. Do you have 
any specific movies in mind I can use for this project? As 
always, I appreciate what you guys are doing! You ROCK! 

Jason 0. 

San Francisco, CA 

Routed: Internet 

Hey Jason. Sure, we can help you out on this one. 
Hollywood does a fairly good job of making the hacker look 
like a loner bad guy, more or less. There are some 
exceptions to this rule, however. Please use the following list 
and let us know if you need anything else: 

Wargames, 1996 114mm (this one by far was the most 
popular old school hacker movie) 

Hackers, 1995 107min (interesting movie, enjoyable, but 
waaaay out there... technical flaws drive me nuts) 

Sneakers, 1992 126min 

The Net, 1995 114min 

Real Genius, 1985 108min 

AntiTrust, 2001 108min (actually a fairly good movie and 
somewhat accurate on a technical level) 

Tron, 1982 96min 

The Matrix, 1999 136min (this has become the movie trilogy 
to bring forth a whole set of new age hackers into the scene) 

2001: A Space Odyssey, 1968 156min 

23, 1998 99min 

Pi, 1998 84rflin 

Gattaca, 1997 lOlmin 

Blade Runner, 1982 117min 

Brainscan, 1994 96min 

Swordfish, 2001 99min (touches on hacking topics and a 
wildly entertaining flick) 



Irvine Underground 

Located in Orange County, California 
Irvine Underground Organization 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 4. 1 

Entrapment, 1999 113min 

Weird Science, 1985 94min 

Enemy of the State, 1998 131min (touches on hacking 

The Lawnmower Man, 1992 107min 

Johnny Mnemonic, 1995 103min 

Electric Dreams, 1984 95min 

Hot Millions, 1968 106min (this one is probably the first 
hollywood hacker-type movie ever made) 

Takedown, 2000 92min 

Independence Day, 1996 153min (touches on hacking 

Pirates of Silicon Valley, 1999 95min 

Anyhow, this is all I can come up with off the top of my head. 
All are great movies in their own right. Each has their 
strengths and obvious technical weaknesses. Keep an open 
mind and of the era these were made when watching them, f 
would recommend each and every one of these movies if 
only for entertainment value alone. 

Blacklisted! 411, 

I've always enjoyed your magazine and THUD. I'm glad to 
see you back after all these years. I figured you were down 
and out for good after Y2K had come and gone. .another one 
bites the dust. And now you're back!! You were right on the 
money with your suggestions and comments on the Y2K 
subject back in 1999 and you ended up saving myself and 
the company I work for a tremendous amount of money. I 
just thought it would only be right to let you know how useful 
and appreciated the information you provide really is. 
Thanks guys. I'll keep reading and tell all my friends you're 

Rodney P28 

Raleigh, NC 

Routed: Internet 

We aim to please. We're all glad we could be of so much 
help to you and your company. If you need any tips on any 
subject in the future, let us know. 

Blacklisted! 411, 

I'm writing to ask you for information about the SEC program 
in Ontario, California. I know someone with a "ghetto pager" 
and wanted to know if you could provide ANY insight on the 
device; it's real-world range, frequency, operation, phone 
numbers, etc. Any information on why they won't allow you 
to have extra service on the phone line that the box is 
connected to? I can understand no answering machine, but 
why no caller ID, etc? Last, why can't you have someone 
else who is on the program in your home? 

Tech Angle 

Ontario, CA 

Routed: U.S. Snail Mail 

Greetings Tech Angle. The SEC program is actually referred 
to as the "S.E.C.P." in Riverside country and run by the 
Sheriff's Dept. out of Banning, CA. Their exact address is 
1627 S. Hararave St., Banning, CA 92220. The device you 
speak of is an "ankle bracelet" and accompanying receiving 
box (called HomeGuard 200) made by Bl Incorporated (www. and monitored by Sentinel, a company based out of 
Irvine, CA. 

Many people think the bracelet is a GPS unit, capable of 

Blacklisted! 411 Volume 6 Issue 3 - Summer 2004 

keeping a constant record of your physical location. While 
it's true that there are versions of this device which do exactly 
that, the bracelet used in Riverside country is not the same 
unit. It's a much more simple unit which only transmits a 
frequency which "announces" it's presence to make sure the 
subject is within the range of the receiving box. 

The box has three lights on it to indicate phone, range and 
power. When the box is receiving a call or calling out to 
report (usually when the subject returns after being out of 
range for some time), the phone light will flash. When the 
subject begins to exceed the range of the receiving box, the 
range light will begin to flash. Once the subject has been out 
of range long enough (time varies), the range light will turn 
off. The power light is pretty obvious. The receiving box has 
a battery backup in case there is a power outage which will 
keep the unit running for up to 48 hours. 

Let's talk about range. The manufacturer claims the unit has 
a range of approximately 300 ft. In the real world, it's more 
like 100 ft. Frequency: They operate in the 300Mhz band. 
We need an actual unit to get the specific frequency tor you. 

Extra phone services. Caller ID: they dont want you to have 
caller ID so you won't know the monitoring phone numbers 
that occasionally call back and exchange information with the 
unit Answering machines and fax machines - they don't 
want any device on the line which can answer incoming 
calls - this could interfere with the receiving box. Same 
pretty much goes with three way, call waiting, etc. 
Incidentally, the Sentinel monitoring phone number (the 
number that calls the boxes) is (949)453-8178. 

Apparently, the bracelets are fairly dumb devices and their 
only job is to constantly transmit a frequency to allow the 
receiving box to "know" you're within proximity. Because of 
this, if you have a buddy on the same program, you could 
theoretically stay at his place overnight and he at yours 
overnight and the monitoring people would never suspect any 
wrongdoing. This would defeat the purpose of the 
supervised electronic confinement program, thus put you in a 
bad position if caught. 

The bracelets, about the size of a small pager, must be in 
contact with the skin of the subject at all times. If it's pulled 
away from the skin, it triggers an internal tamper device, 
which in turn alerts the monitoring company that you've 
"removed" the device from your person. In addition, the 
rubber band of the device is reinforced with metal wires. 
Naturally, cutting through this triggers the tamper switch as 
well. It has an internal battery which is reported to keep the 
unit operating tor 12 months. 

This was an interesting question. If any readers have further 
information on the topic, please forward it to us. 

Blacklisted! 411, 

Really good to see you guys back again. This is from a long- 
time reader. Are you ever going to have the summertime 
beach meets and hosted meets with the equipment give-a- 
ways that you used to have way back in the early 90's? 

Roasted Toasted 

Los Alamitos, CA 

Routed: U.S. Snail Mail 

Hey Roasty! It's been a long time. We hadn't considered 
hosting anymore meets, but we'll think about it. Those beach 
meets were outrageous! When we upped the distro back in 
1995, we officially ended the beach meets and hosted meets. 
Perhaps, after we've been back long enough, we'll host some 
meets on a trial basis to see how they work out. Naturally, if 
we did such a thing, we'd still have them in Huntington 
Beach. Anyone else out there interested in us doing 
something like this? Until next issue, keep hacking and don't 
forget to take notes. 


Cfoafc &.1)agger 

by The Goldfinger 

m^^mmmt^m/ttmm — wmmmBB^mGrnA mm/0 

Man, do you guys remember back in the 80's when everything was cool? Well, maybe not everything, but I am nostalgic right about now 
for that movie called Cloak & Dagger. 

It came out in 1984 and starred the little kid from ET, Henry Thomas, and Dabney Coleman, who played his pops and also his imaginary 
friend, Jack Flack. That movie was cool. 

I was just a kid but I remember wanting to have adventures like that and wishing I could end up in the middle of some drama, just like 
that kid. That movie did have a lasting impression on me because later I learned about real spies, and agencies like the CIA from other 

The only problem was, 1 didn't see how anyone could possibly get into that line of work. 

Nobody I knew, knew how.. .and it wasn't really anything that your teachers knew anything about either. So, it was relegated to being a 
fantasy, and then later, in high school, I was able to "role-play" those fantasies with such RPG's as Ninjas & Superspies or Steve 
Jackson's G.U.RP.S. 

That's (generic universal role playing system) for the un-initiated. 

Yes, I had some nerd-like tendencies in h.s., I will admit that. Role playing games were not exactly what the "cool" kids were doing on 
Friday night, but then, I wouldn't trade those times for anything. I had some good friends, some good times, and playing RPG's 
stimulated my imagination to the Nth degree, and as a result of that, I'm still benefiting from those experiences today. Let me also say that 
RPG's were fun for me; back then, I don't play them now and wouldn't No time, or inclination. 

RPG's are/were cool, but like anything, they should be used in moderation. And not as a substitute for a social life! This goes out to all 
the role-playing nerds out there today; Get out of your parents basement, put away your +5 sword, and get out and try to meet some girls! 

Take it from the Goldfinger yo, I know what I'm talkin' about. Once h.s. gets away, you can't ever, and I mean, never get it back. Then 
you might be left with some regrets, and that's the worst. I didn't become the superfly individual I am today until I was in my early 
twenties and that's no lie. 

But I digress, were talkin' about Spies and real life cloak & dagger type stuff here. Anyone who doesn't believe that there are real spies 
and that intelligence agencies all over the world spend billions of dollars to spy on other countries, foreign industries and corporations 
needs to check themselves. The spy business is big business. 

One of the things I'm gonna do for ya in this article is show you how to apply to real spy agencies like the CIA, FBI, DIA, and the NSA 
so you can realize those dreams if that's your steelo.(what your into). Were also gonna look at some cool ass spy gear and gadgets, as well 
as learn some real life techniques and tactics that you can use to your advantage, in a spy vs. spy or counter-surveillance capacity. 

A good place to start to get a well-rounded education in the Spy game is Tech TV's show called 'Spy School: Secret World of Crime, 
Intrigue, Surveillance and Gadgetry' which premieres every Friday at 8:30pm eastern. Check the website for tv schedules, etc. www. 

The show hits on just about everything you could ever want to know about the spy game, from surveillance to seduction, from blackmail 
to brainwashing, its all there. This program is full of cool features, spy challenges, how-to guides, and reconstructions. Many of the 
world's elite spy organizations secrets are revealed. Fifteen half-hour episodes come from a safe house in an undisclosed part of Britain 
where two students receive a crash course in espionage taught by controversial former British Intelligence officer David Shayler. Special 
challenges are the backbone of each show. Rookie spies are put into real-life situations to see how they cope after they've received an 
initial briefing. I'd rather go on that show than Fear Factor anyday! 

Sample episode titles include:. ..(excerpts from the site) Interrogation and Torture Our two spies are briefed on surviving interrogation 
and torture scenarios and then put in those exact situations. 

The Honeytrap Our female spy faces a challenge that involves investigating club-goers a la Mata Hari, shot with a lipstick camera. 

Getaway Driving Our spies are trained in evasive driving. 

Concealment and Disguise Operating incognito is an essential espionage skill. Here the spies are trained in all aspects of disguise. 

How to Disappear Two apprentice agents are instructed on how to successfully disappear from the face of the Earth. 

AH very cool. In this article your gonna get a mini "spy school" primer from one of Tech Tv's episodes; Return to Sender on How To 
Detect Suspicious Packages/Letters, we'll follow that up with Dead Drops, or Dead Letter Boxes; what they are, how they're used, and 
how to use 'em. 

How to Detect Suspicious packages and letters: 

No one likes to see a stack of bills in the mailbox, but it's definitely better than being the recipient of a letter bomb. Unfortunately, 
detecting one isnt as easy as listening for a tick, tick, tick... but there are some other signs to look out for. Peep it. 

12 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

•Remember* The item doesn't have to be delivered by a carrier. Most bombers set up and deliver the bomb themselves. 

1 . If delivered by carrier, inspect for lumps, bulges, or protrusions, without applying pressure. 

2. If delivered by carrier, balance check if lopsided or heavy sided. 

3. Handwritten addresses or labels from companies are improper. Check to see if the company exists and if they sent a package or letter. 

4. Packages wrapped in string are automatically suspicious, as modem packaging materials have eliminated the need for twine or string. 

5. Excess postage on small packages or letters indicates that the object was not weighed by the Post Office. 

6. No postage or non-canceled postage. 

7. Any foreign writing, addresses, or postage. 

8. Handwritten notes, such as: "To Be Opened in the Privacy of "CONFIDENTIAL" - "Your Lucky Day is Here" - "Prize Enclosed". 

9. Improper spelling of common names, places, or titles. 

10. Generic or incorrect titles. 

1 1 . Leaks, stains, or protruding wires, string, tape, etc. 

12. Hand delivered or dropped off for a friend packages or letters. 

13. No return address or nonsensical return address. 

14. Any letters or packages arriving before or after a phone call from an unknown person asking if the item was received. 

15. If you have a suspicious letter or package. 



Bombs can be constructed to look like almost anything and can be placed or delivered in any number of ways. The probability of finding 
a bomb that looks like the stereotypical bomb is almost nonexistent The only common denominator that exists among bombs is that they 
are designed or intended to explode. Most bombs are homemade and are limited in their design only by the imagination of, and resources 
available to, the bomber. Remember, when searching for a bomb, suspect anything that looks unusual. Let the trained bomb technician 
determine what is or is not a bomb. 

For more information call the BATF: Arsons contact; 1-888-ATF-FIRE 
Explosives Incidents call; 1-888-ATF-BOMB 
ATF Arson & Explosives Division 
Washington, DC 


the Dead Drop 

Now lets take a look at Dead Drops, or DLB*s also known as Dead Letter Boxes. 

A DLB is a physical location where material is covertly placed fix another person to collect without direct contact between the parties. 
Good locations for DLB's are cracks in walls, in and around public trash receptacles, in and around trees and shrubs, inside vegetables 
such as pumpkins, in someone else's mail box, between books in a public library, inside a paper towel dispenser, etc. The key to success is 
ingenuity, so none of those mentioned are especially good ideas, since someone has already thought of them. If the item being passed can 
be disguised as a discarded candy wrapper or hidden inside a cigarette butt, etc., all the better. 

The protocol has pretty much stayed the same since the KGB devised and perfected this method for use in the UK and US during the cold 

This technique is so effective, its still being used today. More than 30 intel agencies and underground groups worldwide use this 
technique. When used by 2 people who have basic skills in counter surveillance, this method has confounded surveillance. Thus, it works. 

You need to know three pieces of tradecraft: 

*Pick a good site for your DLB. This means choosing a spot where you're momentarily hidden from view while you pass by (and either 
load or empty the box). It also means selecting a site that is easily accessible and in a public location. 

* Use a separate set of sites to signal when you're ready to place something in the DLB, or retrieve something from the DLB. 

* Use a foolproof signal that tells both parties that material in the site has been picked up. The first agent can then go back and recover the 
items if the second agent is unable to make the pickup for some reason. 

Step 1: The ready-to-fill signal 

Suppose that you need to deliver a disk to your contact. The first thing you gotta do is transmit a "ready-to-fill" signal. You need to tell 
your contact that you're ready to fill the DLB with your material. For example, you might place a piece of chewing gum on a lamp post at 
a pre-arranged location at a pre-arranged time (perhaps the 1" Wednesday of each month at 3:00 pm). 

The trick is to use signals that can be easily seen by a lot of people, which means your contact doesn't have to compromise his/her 
security while reading your signal. 

Don't fill the DLB until you see the ready-to-pickup acknowledgement. 

Step 2: The ready-to-pickup signal 

When your contact sees the ready-to-fill signal, he/she will send a ready-to-pickup signal. Again, this signal must be sent at a pre-arranged 
time and location, say at 3:00 pm. It might be a chalk-mark on a traffic signpost or a piece of black tape on the back of a park bench. 

When you see the ready-to-pickup acknowledgement, you should fill the DLB within IS minutes (ie by 3:15 pm). After placing your 
materials in the DLB, you immediately return and remove your ready-to-fill signal, thereby indicating to your contact that the box is 
filled. Word up. 

Blacklisted! 411 Volume 6 Issue 3 - Summer 2004 13 

When you see the all-clear signal, you can bounce. If you don't see the signal, return to the DLB and remove the material. 

Step 3: The all-clear signal 

Once you see that your ready-to-fill signal has been removed, your contact goes to the DLB and retrieves the material that you placed 
there for him/her. This must be accomplished before a pre-arranged deadline, say 3:30 pm. Your contact then returns and removes his/her 
ready-to-pickup signal, indicating that the box has been emptied. 

When you see this all-clear signal, you leave the area. However, if you dont see the signal by a pre-arranged time, you return to the DLB 
and retrieve the material in order to prevent it from falling into unauthorized hands. 

This system of signals can be made even more secure by using positive acknowledgement signals instead of simply removing existing 
signals. To maintain airtight security for your DLB, simply weave a number of FAKE DLB locations into your routine on a daily, weekly, 
or monthly basis. Narrow passageways between buildings, covered pathways in public parks, nearby dumpsters behind restaurants... all 
these are ideal. 

Simply make it a point to walk past these fake DLBs on a regular basis. Remember, each DLB is located such that you'll be momentarily 
hidden from view as you pass it, and if you're under surveillance, THEY" will go ballistic. They'll need to place an agent at each 
suspected DLB at the precise moment you walk by. Major pain in the ass for them. If you've chosen your sites carefully, there's no way 
for "THEM" to monitor these locations. If you have three or four fake DLBs that you regularly walk past, you'll soon notice the telltale 
pattern of strangers who just happen to be loitering nearby at the instant you're momentarily hidden from general view. 

When this happens, you've detected the presence of a surveillance team. Suspend your covert activities until the surveillance passes. Well 
now you know 2 very important skills used by spys and various agents the world over, but your still not even close to being a spy my 

But don't fret, I'm gonna give you the 41 1 on how to apply to the agencies that hire people for real spy work. It won't be easy, because 
there are requirements, some of which include: 

Being poked and prodded. If you pass the initial application process — U.S. citizens only — you'll be subjected to a polygraph examination 
and drug test. Drug policies at the agencies do have a smalt amount of leeway with regards to former drug use (e.g. "I smoked, but didn't 
inhale"— Slick Willie Style baby!), but not much. You may fly through the urine and lie detector gauntlet, but not the background check. 
All agencies will check credit and criminal records, plus they'll interview current and former employers. Be patient. The process can take 
more than a year. 

If you didn't give any of your previous bosses the finger when you walked out the door, the world of intelligence could be waiting for you. 

FBI) What it does: Investigative arm of the Department of Justice. Pursues violations of federal criminal law and protects the United 
States from terrorist activities. Since last year, focus has shifted to counter terrorism. 

Who it needs: Special agents with expertise in a multitude of areas including, but not limited to, information technology, engineering, 
physical sciences, foreign languages, military intelligence, and accounting. 

Requirements: Between the ages of 23 and 37. Must have four-year college degree and good vision, and must pass certain physical 
requirements. *off the record* the FBI won't even really look at your application until you've accumulated 3 years of related field 

CIA) What it does: Collects and analyzes foreign intelligence for the president and senior policymakers. Intelligence is collected via 
satellites, signal interception, and informants. The agency doesn't have to publicly report its spending or operations, and many people 
presume the agency uses shady collection methods. 

Who it needs: Eagerly seeks diversity. At last check, 6-foot blond Nordic he-men don't blend in smoothly in the Middle East. Being able 
to speak multiple languages is key. Right now the CIA is most interested in people who know Central Eurasian, East Asian, and 
especially Middle Eastern languages. Experience in international economics and business is a plus. 

Requirements: Maximum age 35. You'll also be tested on your ability to withstand coercion and keep a secret. Although you may be 
traveling, you must relocate to the Washington, D.C., area 

How to apply: Check available positions at 

Those in the agency recommend you learn as much about the CIA before you apply. 

Always be willing to adapt. Nothing is routine. 

D1A) What it does: Produce foreign intelligence for the military to be used in defense and in times of war. It differs from the CIA in that 
it's a combat support agency of the Department of Defense. 

Who it needs: People with degrees and experience in all sciences plus history, engineering, and environmental health, just to name a few 
others. Proficiency in additional languages such as Korean, Chinese, Russian, and Serbo-Croatian also a plus. If you can collect tons of 
information and make sense of it, the D1A wants you. 

Requirements: None beyond U.S. citizenship and passing the aforementioned testing. Best candidates have at least a 3.0 GPA, good 
writing and speaking skills. 

How to apply: Check for available positions. If you find one you like send in your resume, and be prepared to fill out a lot 
of paperwork. 

14 Volume 6 Issue 3 - Summer 2004 Blacklisted! 41 1 

NSA) What it does: Makes and breaks codes. It's our nation's cryptographer. In addition, it intercepts endless volumes of 
communications data via radio, phone, and email, and it makes sense of it. Who it needs: Mathematicians. Ifs believed that the NSA is the 
largest employer of them in the United States. IT experts are also in great demand. 

Requirements: Must undergo a psychological and aptitude test 

How to apply: Check 

If positions are available, click the option to apply online. 

A life in intelligence could be the coolest job ever. You'll be the life of a cocktail party. 

You'll finally have something super cool to really impress chicks with... Too bad your new position requires you to keep your mouth shut. 

Maybe your dream of being a spy or agent isn't quite realistic, maybe you don't really want to invest the time, money and supreme effort 
that is required to actually become a spy or agent from one of the aforementioned alphabet-soup agencies. Being a real spy is hard work, 
and if you think about how much time and effort your going to have to dedicate to this endeavor, you'll see that its going to eat up lots of 
precious TV time and that imprint you 've already invested so much time molding into your couch might fade away. So for you, there is 
another option! Weekend Warrior Spy's rejoice! 

Visit (excerpt taken directly from their site) 

Live the life you have only seen in movies or read about in novels. Each trainee at COVERT OPS will experience all the thrills and 
excitement of the clandestine life in a completely safe and secure environment. 

Your Mission Impossible Scenario: You have been selected by an ultra-secret paramilitary unit for a covert mission in hostile territory. 
Only the best-trained agents will be able to survive the mission, so your training must be thorough and intense. You will be taken to a 
secret training base where a hand-picked cadre of Green Berets and contract mercenaries from the world's toughest special operations 
units will teach you all the actual skills needed for this operation. 

High speed evasive driving both on and off road, combat pistol shooting, unarmed self-defense, espionage techniques, counter- 
surveillance, explosives and booby-traps. The mission is critical, the training is absolutely real, and the atmosphere is PURE FUN AND 

Your adventure begins at the Tucson, Arizona airport. A COVERT OPS undercover agent, displaying the recognition signal you 
received with your orientation packet, meets your flight. You follow the agent to a PMP (Personal Meeting Point) and are briefed on your 
mode of transportation to the training site. It may be by bus, car or even helicopter or light aircraft. 

Once at the site you're cleared by the armed guard at the gate. Don't expect to see the outside world again until your training is complete, 
COVERT OPS instructors in their distinctive desert camouflage fatigues are waiting to show you to your room and explain the meal 
schedule and other administrative functions. Tonight you bed down early, knowing the following day will be as intense as any in your 

Sounds pretty cool huh? I would've checked it out myself, but I get all this drama in my day to day life. 

"I Can't find your magazine in my local bookstore" 

Sound familiar? 

Are you having trouble finding our Magazine? 

Since we've been out of print for a few years, most of the retail book stores and newsstands are not carrying our title... .] 
After a few issues hit the streets, more and more stores will carry our magazine Its all a matter of time We know it can 
next to impossible to find Blacklisted 1 41 1 in your local neighborhood bookstore at a time like this. There are a few ways ; 
can get our magazine Subscribing is the best way to get the magazine ...NOW. This can be done through regular <sn; 
mail or by visiting our website It's somewhat easy to obtain our magazine if you really want it 

If you're in a place that doesn't carry our magazine and you'd like to see i 

i the future, do one of the following 

1. If you're not sure if the store you're in carries our magazine. ASK THEM 1 They might be sold out or they may have hidden 
the magazine in a special section or behind other magazines Those pesky anti-hacker type drones might be hiding them. 

2. If they do not carry our magazine, tell the store manager that you would like to see this magazine in their store in the 
future. Our ISSN is 1082-2216 Give them this number and tell them they should call their magazine distnbutor(s) to obtain 
the title. Make sure you let them know how disappointed you'd be if they didn't stock them or 'forgot" to at least call and TRY 
to get them in stock. 

3 If that fails, you can give us their address and phone number and possibly a contact name. We will have the chance to 
call them and convince them into carrying our wonderful magazine. 

4. Subscribe if you don't want to bother with any of the previous methods 

5. Take a look in Tower Records/Magazines. Barnes & Nobles. Borders or Bookstar They usually have them in stock 

6. Borrow a copy from a friend - make sure to return it when you're done 

Blacklisted! 411 Magazine 

P.O. Box 2506 

Blacklisted! 411 

Cypress, CA 90630 

Volume 6 Issue 3 - Summer 2004 


P.O. Box 23097, ABQ.NM 87192 

Some of our 150+ popular High-Tech 
Security & Survival Offers, See our 
Free Online Catalog for descrip- 
tions, prices, policies. Or please send 
$3 for hardcopy (USA/Canada) 

Internet Security Manual 

Internet Frauds Data book 

Internet Tracking & Tracing 

Computer Security 

The Hacker Files 

The Hard Drive Manual 

Caller ID & ANI Security 
Cellular/Cordless Phreaking 
Beyond Phone Color Boxes 
Fax Machine Security 
Voice Mail Security 
PBX Security 
Pager/Beeper Manual 
Answer. Machine Security 


Stopping Power Meters + Video 

KW-HR Meters 

The IG Manual 

Gas & Water Security 

The Loadflnder 

The Heat X-Changer 

The Vortex Generator 

Identity Theft Manual 
Polygraph Secrete 
Secret & Alternate IDs 
Beyond Van Eck Tempest + Video 
By Order of the Magnitude 
Enemy POW, Civilian Internees 

& Detained Persons 
Stealth Technology 
Simple/Cheap Security Elec. 
Secret & Survival Radio 
Security/Surveillance Freqs 
The "Silkwood* (Radiation) 
Survival Guns & Ammo 

Rocket's Red Glare! 
High Voltage Devices 
Cryptanalysls Techniques 
Auto Theft Countermeasures 

ATM Security 
The Placak Report 
Check & M.O. Security 
Credit Card Security ' 
The Cons & Scams Databook 
Remote Office Tactics/Strategies 
Social Engineering 
Ultimate Success Manual 
The "Goldflnger" 
Government Land Grab 
Casino Secrets 

Unpublished & Secret Law... 
Legal Citations to 

Prevent Dismissals 
Secrets of Federal Civil Rico 
Suing U.S. Gov. / Officials 
LegaiFiling Sys./Initiai Steps 

Radionics Manual 
Heal Thyself! 
EMF & Light Therapies 
Faking Illness & Injury 

Cancer Prevention/Remedies 
Prevent/Cure Dental/Disease 
Prevent/Cure Colds/Flus 
Bio-Spectrum Analysis 
X-Ray to Death! 
Body Sculpturing 


The Dirty 2-Dozen 

Mind Control 

Subliminal Mind Control 

Under Attack! 

EM BrainBlaster 

Faking Psychic Powers 

Sedona Magic 

UFO's & ETs 

Secrets of Solderless BBs 

Hydraulic Theory to Cheops 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

The Ear 

For the beginning scanner enthusiast 

By ML Shannon 

The Hacker Ethic 

There is a certain fascination, a curiosity, a need. To want to know. To obtain information It sometimes borders on an 
obsession, sometimes at the cost of jeopardizing one's academic standing, as in the early days of the Tech Model Railroad 
Club at MIT. Or being little more than a nuisance in the early days of computing, and on into the dangerous days of hacking 
in the 'New Millennium'. After 9-11. This is known as the Hacker Ethic. The idea that information should be available to 
people and that secrets suck. It is a mindset, an attitude, a way of living. It is something that either you understand, or you do 

It is about people who like to take things apart and figure out what makes them tick, and in putting them back together, 
finding a way to make them better. And, it isn't just about computers. It is also about wanting to know what is happening in 
the world around us. On the Internet, yes, but also the countless thousands of radio signals that permeate the atmosphere, 
no matter where we are. To be able to know- who is saying what to whom. Again, It is something- a way of life that either 
you understand, or you do not. 

In this article, I hope to encourage you to explore the fascinating hobby of scanning. Fascinating, indeed, as you begin to 
search the wavelengths and intercept the signals that are just waiting for you, if you tune to the right frequency. Read on, and 
you will learn about some of them. But beware! There will be times when you find it difficult to tear yourself away from 
listening. You might tend to put off things in order to figure out that 'mystery' signal that you stumbled across but haven't been 
able to identify. 

I will start with a few words about the history of radios and, in the first person, some of my experiences. 

How I Got Started 

I first became interested in radio communications when my dad bought me a kit from the National Radio Institute. With it and 
a soldering iron I could build any number of gadgets, including a five tube superhet AM radio. Oh, we already had a radio, but 
somehow building my own made it more interesting to listen to. 

Down the alley from our house, there was a guy who had a little shack in his back yard. A TV repair shop. His name was 
Fred Freeman, and being a precocious kid, I pestered the poor fellow with questions about electronics. It was he who took 
the time to explain the resistor color code to me. Well, maybe just out of generosity, but then more likely in the hope that I 
would go away for a while, (it worked) he gave me a military surplus BC-342-M short-wave receiver. This was a real treasure 
for a kid in the fifties, and I was soon hooked on short-wave. In the wee small hours, Trimm headphones clamped tight to my 
ears, pencil in hand, I was oblivious to all but distant and mysterious sounds from exotic places. And from countless hours of 
listening I soon learned how to identify what I was hearing. 

Radio Moscow always announced the news with "And now the news". Accents helped, and it wasn't long before I knew 
when I was listening to the BBC without having to wait for a station break. Some broadcasts by the AFRS, the Armed Forces 
Radio Service signed on with the first six notes of 'My country tis of Thee', and there was the exotic call of the Kookaburra 
bird when a "Down Under" station came on the air. I could tune in HCJB, a religious station in Quito, Ecuador, and some 
times even Radio Sophia, Bulgaria. Signals from around the world with the BC-342M and the antennas I was stringing up 
much to the consternation of the neighbors and the GTE 'Telephone Man' who told me I could not use their telephone pole (in 
the alley behind our house) for my 40 meter dipole. They finally gave up since I kept putting it back every time they cut it 

Indeed, there was a lot to listen to, but there were things I could not tune in. Such as what was happening in my 
neighborhood. Like the local police department. They had radios that transmitted on VHF, which at that time, was Terra 
Incognito to most hobbyists. There were no scanners, the receivers available on the surplus market were expensive, and 
they were crystal controlled. 

I have never lost my interest in short-wave, but back then 1 became intensely interested in being able to monitor what 1 could 
not and was determined to find a way. 

Then, one day, I read an article, I believe it was in Popular Electronics, about how to modify a standard FM broadcast radio to 
pick up police calls in the 150 megacycle band. I had an old Magnavox tube type and so I started tweaking, changing the 
number of turns on the oscillator coil and adjusting the trimmers on the variable capacitor. Tuning was critical because of the 
difference in bandwidth, reception was poor with the audio being faint, but it worked. My basement workshop was often 
visited by kids in the neighborhood who wanted to see if I could "really tune in police calls". 

A few years later, there were battery powered portable radios that tuned VHF and, if you tuned carefully enough, it became 
possible to intercept the local police as well as some of the federal agencies. Yep, Hoover's boys. And, since the feds 
apparently didn't realize that they could be monitored, they weren't too careful about what they had to say. 

Most equipment was still made with vacuum tubes; the transistors available didn't work well above about 50 megacycles, until 
Fairchild came out with a half-dollar size bipolar. They were far too expensive for us, but then someone discovered that 
General Telephone was junking equipment that used them. GTE refused to sell the scrap to us, so in the dead of night, we 
sneaked into the yard at Superior Scrap Iron to get these forbidden treasures. Soon we were building battery operated 
"home brew" receivers. VHF! 

Blacklisted! 411 Volume 6 Issue 3 - Summer 2004 17 

And then, in the seventies, programmable scanners appeared on the market. I remember well my first one, a Regency 'Touch 
Series' model. It used membrane buttons and was indeed touchy. Sometimes it worked, sometimes it did not. This was 
followed by the Bearcat 250, a quantum leap in programmables, and the first to incorporate Search and Store. One of the 
greatest scanners ever made. And although coverage was limited , it was possible to "trick" the BC-250 into receiving the 
406 - 420 MHz federal agency band. Something that the manufacturer was very uncomfortable with and didn't want to talk 

Soon, the use of VHF was growing and the bands becoming crowded, so many services were moving to UHF. Between the 
two, there were countless stations to monitor. So many that it was becoming difficult to keep track of all of them. Police and 
fire departments, public works and so forth. So many agencies, so many transmissions. How could you tell one from 

The Ear. 

Just as with short-wave, over a period of time, I developed the ability to quickly identify the different transmissions that I tuned 
in. Much of this is second nature to experienced "scannists" but you who are new to this hobby may find these techniques 
useful. Developing The Ear means hearing what you hear, not just monitoring. With some practice, you will in most cases be 
able to quickly- almost instantly- determine the type of service you are tuned to. 

The Good News 

To a certain extent, you probably have already acquired this skill, but in a way that you may have not realized. Television. 
Yes, television. Think about it. You are watching a sitcom. Suddenly the background music and the canned laughter stops 
and the voice emanating from the speaker is different. Polished, practiced, professional. It is a preview of the Ten O'clock 
news or whatever. And you instantly recognize the change. Sometimes it is more subtle. You are watching a movie in which 
there is a chase scene. You hear the screeching of tires, the roar of engines, and suddenly you are watching a commercial. 
You are still hearing the same things, the speeding vehicles, and then you see a well known NASCAR driver pulling over to 
the side of the road, getting out, and then telling you about how he loves his Ford Taurus. The networks are sneaky in how 
they work these commercials into the movie. And, again, so it is with scanning. Things can change quickly as your radio 
hops from one station to another. So now, let us look at some of the ways... 

Frequency Allocations 

As you become experienced at scanning the airwaves, you will start to become familiar with frequency allocations. Bands 
that are used for specific purposes, such as business, military, federal agencies, police and fire departments. But what you 
might expect to hear in a particular area of the RF spectrum, and what you may actually intercept may not be the same. 
While the radio spectrum is divided into many bands, there is an overlapping of what agencies, businesses, individuals, might 
be using them at any given time. 

An excellent aid is the frequency spectrum poster available from the US Government Printing Office. This is a large {30" x 
40") chart that graphically lists all allocations in the Radio Frequency spectrum. As you will see on the chart, sometimes the 
same bands are assigned to different services, shared by both government and non-government agencies, so you might hear 
the local police or a three letter agency or business radio. And what business uses a particular frequency in one area may be 
used by someone else in a different location. 

Some of the Federal agencies use the same frequencies in all areas, such as the Secret Service 'Charlie' at 163.375. But 
where 461.175 in San Francisco is Hyatt Hotel security it will probably be used by another business in Dallas or Baltimore 
even though both cities have Hyatts. Please keep this in mind as you are scanning. 

Now, way back when, there weren't many frequency guides other than FCC records which weren't readily accessible. You 
had to go to a field office and search through a microfilm {'fiche') reader which was a very time consuming process, and in 
some offices the people there were not exactly 'user friendly'. Kneitel's Top Secret registry was first published in 1978 by 
CRB Research, and before that, there were only a few regional lists available. 

There is no such thing as a "secret" frequency. All frequencies are simply numbers. How 
many cycles, megacycles, gigacycles. I have heard people tell me, upon learning that I am 
into scanners and short-wave listening, that some frequencies are so secret that I could be 
arrested for espionage just for having them. Malarkey. There are, naturally, frequencies 
used by people who would rather you not know about and there are transmissions that the 
law says you can not monitor, and for the most part, you are not allowed to repeat anything 
you hear on most frequencies, so if you do, and it gets back to certain people, then indeed, 
you may find yourself in hot water. But, again, frequencies are just a matter of numbers. 

Today, there are many frequency guides available. Books, CDs and Internet sites. Using them to look up a frequency that 
you are monitoring may solve the mystery of an unknown station, but then it might not. The actual FCC listings, which are 
available on CD, sometimes reveal very little information. A license may be issued to the ABC Corporation but this may not 
tell you exactly what it is; the radios may be used by taxicabs, a construction company or whatever else. Federal agencies 
such as FBI, Secret Service, etc. are not licensed by the FCC so they are not included in FCC records. However, there are 
other sources of these frequencies listed at the end of this article. 

What The Ear Might Hear: 

Aircraft, private and commercial and Air Traffic Control 

Airport Security 

Airport Shuttles 

Air Shows. Including the incredible Blue Angels 

Amateur Radio 

Analog cell phones: Not legal to monitor 

18 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

Baby Monitors 

Businesses of all kinds 

Cable TV leakage 

Citizens Band 

Coast Guard vessels 

Cordless Telephones: Not legal to monitor 

Emergency Services; Emergency Broadcast System, Red Cross, FEMA 

Family Radio Service, a license free band anyone can use 

Fast Food drive-up windows employees 

Federal agencies 

Ferries in most coastal areas 

Fire departments and networks, local and federal 

Forest Rangers 

General Mobile Radio Service (GMRS) 

Law enforcement, City, County and State 

Local government agencies; public works, utilities 

Marine; ships large and small and marine telephone. 

Media and remote relay (May be unlawful to monitor) 

Military aircraft. The SAC, fighters on training missions, aircraft refueling 

Military facilities, Army, Navy, Air Force and Marine Corps posts. 

Networks. State and nationwide common channels for law enforcement, firefighters and others 

Pirate 'Micro-Broadcasting' (Low Power) stations and some that are (for now) legal. 

Public Transportation, busses, trolleys and here in San Francisco, cable cars 

Railroads, freight trains, switch-yards, Amtrak 

Search and Rescue operations 

Security guards; patrols and fixed locations 

Surveillance transmitters 

Taxicabs and Limos 

Telephone company maintenance 

That's a lot of coverage, a lot of services. So, in order to learn to recognize the signals to which you are tuned, to develop 
The Ear, here are some things to learn. 

Signal Strength and Clarity 

Commercial and government radio systems are designed so that that reception is full quieting meaning no background noise, 
and sound quality is such that the transmissions are clearly understood. Important, in the case of law enforcement and other 
emergency services, lives often depend upon radio communications. Unfortunately this is not always the case. Before they 
installed the new trunked system, I used to hear many complaints on San Francisco Police Instant Communication Channel 
Six, where reception is poor in certain areas. 

So if you tune in something where the sound is muffled, like the voices are " inside a barrel" this should start to narrow down 
the source. You may be intercepting a baby monitor or if your are lucky, even a surveillance transmitter. Think frequency- 
Most baby monitors use cordless telephone channels in the low VHF range; 46 and 49 MHz. Surveillance 'bugs' can operate 
on virtually any frequency but those used by amateurs are most likely to be heard on or just above and below FM 
broadcasting. A spy worth his salt will use other frequencies and the Feds probably use Spread Spectrum which you aren't 
likely to hear at all. 

Duplex and Full Duplex 

Duplex refers to radio services where the mobile units can talk to each other through the repeater but only one can transmit 
at a time. Full Duplex means both parties can talk at once. So, when you hear this, you are most likely tuned to a wireless 
telephone. But, it could be a phone conversation between two actors in a TV sitcom or movie from cable TV leakage. Think 

Blacklisted! 411 is written for the hands-on 

hobbyist, design engineer, technician, 
network admin, and experimenter. Hackers 
and professionals alike read it and love it. 

Join the team and give us your support. 

We're accepting articles, photographs, 

design work for swag and our website, 

artwork and creative ideas. 

nm i fti 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


Length of Transmission 

Wireless telephone (cellular or cordless) conversations may go on for hours. Cellular calls, which once were kept short due to 
the high cost, tend to be longer now that the price has dropped and usually longer than commercial two-way radio which tend 
to be brief. Local police departments sometimes need to make long transmissions when describing several suspects at a 
crime scene, but will usually break them up into a series, to temporarily clear the air for an incoming emergency call. Fire 
department transmissions are usually short and somewhat terse. 


Once, the world of radio communications was male dominated. Today, fortunately, this is no longer true. And while you can 
not necessarily identify a service by the sex of the person speaking, you may be able to narrow it down. Police dispatchers 
are more often than not women, particularly in large cities. Here in San Francisco, I sometimes hear one male but the rest 
are female. Fire Departments are more likely to use male dispatchers for some reason. Taxicab companies may be either 
sex but are more often males. Most of the voices you hear on Federal law enforcement agencies will be male, but not all. 

Sometimes you can make a good guess as to the approximate age of a person, sometimes not. Elderly people may sound 
their age, as might the very young. It is unlikely that, at either extreme, they will be dispatchers for a police or ftre department 
but they might work for a cab company. Neither are likely to be dispatching for a federal agency, or to be an agent on the 
other end of the communication, but people of all ages may use the General Mobile Radio Service (GMRS) as well as 
amateur radio frequencies and of course, wireless telephone. 

Voice Quality 

It is easy to tell when you are tuned to a commercial station. Professional broadcasters such as newscasters disk jockeys 
and people who make TV commercials are easy to recognize; you hear them every day. So should you hear these 
'professional' voices on your scanner, you may wonder why. There are a couple possibilities. You may be hearing a remote 
broadcast channel; an on-location reporter relaying to a radio or TV station. Or, in the UHF bands, you may be hearing the 
audio from a TV station which is FM. Hint: if you hear a lot of 'buzzing' sounds that lock up your radio and you have to keep 
hitting the SCAN button, then this is probably what you are tuned to. What frequency band are you on? 


You tune in on a transmission and you hear Dry Standpipe, Phantom Box, or Engine Company then you know you are 
hearing a fire department even before terms like 'structure fire'. Ambulance attendants and Paramedics frequently use 
phrases like' conscious and breathing' or 'equal and reactive'. Should you be tuned to a taxicab company, you will hear terms 
such as 'No-Go' (the passenger wasn't at the pickup location) 'Bingo' (after dropping a passenger, at that location there was 
another one waiting for a cab) 'Stand' (A taxi stand, a place where cabs wait for the next assignment) and you may also hear 
conversations if the cab company has duplex radio system; the drivers talking back and forth. I drove a cab for a while after 
graduating from college, and I can tell you it can get really interesting. Especially late night at a small company. 

Physical descriptions of a person, height, clothing, etc. usually means police but could also be a private security guard 
company. If you hear the word 'signal' you may be tuned to the FBI as this is a word they sometimes use for agent. Another 
FBI term is '91 New' which means a bank robbery that has just occurred. The Secret Service usually use the agents name 
and city. Baker, San Francisco is agent Baker calling the San Francisco dispatcher, and on Customs Service channels you 
will frequently hear the word 'sector' What seem like ordinary household items such as pillowcases, towels, sheets, might not 
be emanating from someone's house; you may be hearing the house-keeping staff at a hotel. Their security guards may be 
close to the same frequency, and these channels can get very interesting! 


If you hear someone getting emotional, raising their voice, screaming, then you may be tuned to a commercial station (movie, 
sitcom), relay link or cable TV leakage around 150 - 170 MHz, or wireless telephone. Perhaps business bands, taxi 
companies (not all that unusual), and some local government agencies such as public works, street cleaning and etc. Some 
of the people at some of these agencies here in San Francisco get real chatty, since they (apparently) don't know the new 
trunked system can be monitored. Amateur radio is another possibility, what with the way it has deteriorated in recent years. 
But this is rare on law enforcement radio. 

A few years ago, I was sitting here typing when I heard gunfire. A full automatic weapon. And not very far away. A few 
seconds later I heard sirens. Lots of them. I spun the knob on my R7000 to the Police Instant Communication channel 3 
(460.075) and heard 'code 33'. Police codes vary from one area to another but in San Francisco, 33 means restricted traffic; 
an emergency situation. 

A sniper fired dozens of shots, hitting several people including two police officers. Even though two cops had been shot, the 
officers and dispatchers maintained the same calm professionalism as always. True, as an experienced scannist, I could 
sense the stress in their voices but no one lost control through the entire incident until the final Code 4; 'Suspect in custody'. 


On how many stations you monitor will you hear people laughing? Well, you rightly figure wireless telephones and the Family 
Radio Service, of course, GMRS (General Mobile Radio Service a sort of Citizens Band on UHF) which is also likely, and 
perhaps some business channels as well as, yep, taxicab companies. Also commercial radio and TV stations and remote 
broadcast locations, and on amateur radio. On Fire department channels this is most unlikely but don't overlook police 
departments. It is not unusual to hear people chatting and laughing quietly in the background at the San Francisco Police 

20 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 


Profanity, 'foul language' or whatever you want to call it is a no-no, but you still hear it. The most likely service is, of course, 
wireless telephones. Other possibilities are amateur radio (especially since unlicensed operators can walk in and buy two 
way radios at Radio Shack) and possibly GMRS and FRS. As you already read, cab drivers sometimes get a little hot and 
become rather expressive. Like when a competing cab company 'spears' (steals) their passenger at a pickup point. Yup, 
some cabbies have scanners, too. 

Put It All Together 

Your radio stops on a signal and you want to know what it is. You hit the <MAN> button to stop the scanning and wait for the 
next transmission. Think about what you have learned so far. What frequency is in the display and what does that tell you? 
How long do the transmissions last? Is the sound quality good; easily understood or is it muffled? Can you hear both sides of 
the conversation? Are the voices excited? Are they cussin' up a storm? Listen for the terms you have read about. After a 
while, all these things will become second nature and you will quickly know what you are hearing. 

What The Ear Might Not Hear 

Signals on the airwaves may take forms other than the ordinary speech. They may be encrypted analog, digital, or encrypted 
digital. Right- digital is not necessarily encrypted. 

Types of Transmissions 

Let's start with encrypted analog transmissions which use Frequency Inversion. This is a method of processing an audio 
signal-speech- by taking the frequencies above a certain point called the baseline and substituting them or converting them 
to low frequencies and vice versa. The frequencies are switched or 'inverted'. Low becomes high and high becomes low. 
This is one of the signals you may hear on cordless telephone frequencies or certain brands of Baby Monitors. 

What it sounds Ilka 

A bit like Donald Duck with a sort of metallic twang or whine. You can tell that this is Human speech and sometimes you think 
you can make out a word here and there. It may be possible to reconstruct this type of signal back into clear speech using 
another Frequency Inversion scrambler if it is the same kind; if the baseline frequency is the same and many of them do use 
the same one. And, there are programs available on the Internet that have an adjustable base frequency. 

Frequency Inversion, Variable Baseline 

Also called "Rolling-Code Analog" this is a form of Frequency Inversion scrambling in which the baseline frequency is 
changed according to a pre-arranged scheme or at random, many times per second. When this system was new, some ten 
years ago, it sounded much the same as ordinary frequency inversion but with a loud 'knock' sound about two times per 
second. I haven't found a wave sample of this on the Internet but the term 'knock' is an accurate description. If you happen to 
hear this transmission, you will recognize it. Sophisticated software (Fast Fourier Series, I believe) and a powerful 
workstation or perhaps a super-computer may convert some such scrambled speech back to "clear". This depends upon how 
often it changes. 

Since then, several 'levels' of Fl have been developed by Transcrypt International, as well as other speech encryption 
systems. Samples of the scrambled sound are available at some site listed at the end of this article. 

Digital Transmissions 

The method of converting analog speech to digital in two way radio systems is not unlike that which is used in the digital CDs 
you play on your stereo. Sound feeds into the front end of a circuit that opens a 'window 1 for a specified length of time 
(microseconds) where it is 'sampled' or measured. The frequency that is in the window at the time is given a digital (binary) 

How long the window is open; the sampling rate, depends on the required frequency response. For music, the rate is much 
higher in order to be able to reproduce the entire range of hearing; 20 to 20,000 cycles. For two way radio, a bandwidth of 
3000 cycles is sufficient so they have a 'splatter filter 1 that reduces or 'clips' the audio so it has a narrower bandwidth, and so 
the sampling rate is lower. To turn it back to sound, the process is reversed. An oversimplification but basically that's how it 

Unencrypted Digital 

This includes PCS cellular phones and NexTel and probably others. Digital speech sounds much like the background noise 
on your scanner; with the squelch open while tuned to an unused frequency. 

Encrypted Digital 

There are several digital encryption methods used, some more complex than others, the difference being in how secure, they 
are. This is based upon the 'keyspace' or length of the 'password'. None of them - as far as I know - can be converted back to 
normal clear speech by us hobbyists with our Pentiums. 

One of the first methods used was the Data Encryption Standard; the DES, Developed by IBM many years ago as Project 
Lucifer. It used a keyspace of 56. The DES can be successfully attacked with a specially designed computer, such as the one 
developed by the Electronic Frontier Foundation several years ago. It cost them something like half a million dollars to build. 
Today, a group of hobbyists might be able to crack the DES as a joint effort, but for radio transmissions, I doubt it is being 
used much any more; With the DES compromised, new systems of encryption are in use by federal agencies. DVP or Digital 
Voice Protection is one, the military Fascinator algorithm is another, but they are secure enough that they won't be defeated 
for many years (centuries?) to come, after which the information wont be of much use to anyone. 

Blacklisted! 41 1 Volume 6 Issue 3 - Summer 2004 21 

Digital Scanners 

Uniden has several scanners that can monitor some digital transmissions, such as APCO 25, used in trunking systems. But 
as to other digital systems such as NexTel or ceil phones, and the above, nope. 

The problem is not just that transmissions are digital, but that timing, sampling rate and sync and other factors may not be the 
same for different signals. GSM (Global Systems Mobile) wireless telephone isn't necessarily the same as the digital 
transmissions in the trunked radio system, and etc. 

Data Transmissions 

So far this article has been about voice transmissions but a great deal of what is being broadcast over the airwaves is data. 
Transmitting data by radio has been used since at least the days of World War II when there was wireless teletype (RTTY), 
and weather maps and documents were sent by 'wirephoto'. These are some of the strange sounding signals you can hear 
on the HF bands, one that sounds much like the percolating of a coffee pot. 

In the VHF and UHF bands you will hear many data signals. Pagers such as Flex, ReFlex and Pocsag, Mobitex data 
terminals, police Mobile Data Terminals, Ardis. and others. Now most of these signals are not, technically, encrypted. They 
are not 'scrambled'. They may use a proprietary system but some of them use plain old ASCII . Nevertheless, it may be- and 
probably is- unlawful to decode them. Pagers, for example. 

Amateur radio 

Ham radio operators can communicate using data over the ham bands similar to commercial pagers, using a computer and 
two way radio connected together with a Terminal Node Connector; TNC, with a format much like pagers. 


This, ACARS, is a method of intercepting signals from commercial aircraft and being able to plot them on a computer screen 
map. You can actually track the flight of a given airliner. For details on ACARS and amateur packet radio, see http://web. 

At the end of this article are fisted a few web sites that have captured some of these sounds and stored them as wave files. 
Listening to them makes it possible to identify some of the data signals you will hear. 

Scanners and The Law 

Federal and local laws prohibit monitoring some types of 
transmissions. Cellular radio, cordless telephone are verboten, as is 
commercial paging, even if you cant "decode" the signals. The same 
is apparently true of federal agencies using encryption, even though 
there is no way you will ever be able to decode the transmissions. 

It is possible that mere possession of devices that can be used to 
decode transmissions, such as pagers, may be unlawful even though 
they have legitimate uses in amateur radio. There have been raids, 
by federal agents, of companies that sell devices that can decode 
data transmissions and the owners arrested and prosecuted, if you 
want to know just what is and is not legal to tune in, please consult 
an attorney. 

The law also contains provisions that affect the manufacture of 
equipment used for listening to or receiving radio transmissions, 
such as "scanners." Section 302(d) of the Communications Act, 47 
U.S.C. Section 302(d), prohibits the FCC from authorizing scanning 
equipment that is capable of receiving transmissions in the 
frequencies allocated to domestic cellular services, that is capable of 
readily being altered by the user to intercept cellular 
communications, or that may be equipped with decoders that convert 
digital transmissions to analog voice audio. In addition, such 
receivers may not be manufactured in the United States or imported 
for use in the United States after April 26, 1994. 47 CFR 15.121. 
FCC regulations also prohibit the sale or tease of scanning 
equipment not authorized by the FCC. 47CFR 2.803. 

More on this at; 

Then, there is the Communications Act of 1934 that restricts 
scannists from repeating anything they hear except from 
transmissions intended for the general public (commercial 
broadcasting) amateur and CB, and emergency distress signals. 

And also be aware that having a scanner in a motor vehicle may be 
unlawful In some areas. Some states make exception for ham 
operators, and the laws apparently also except the news media. 

If you have any doubts about what you can or can not do, consult an 
attorney. Assuming you can find one that even knows what a 
scanner is. 

The Trunked Radio System 

I will use the San Francisco Police Department as 
an example here. Before the trunked system went 
into effect a few years ago, they used conventional 
UHF on the 460 MHz band and "Low Band" on 45 
MHz. The UHF was referred to PIC (Police Instant 
Communications) with which, as I mentioned, there 
were reception problems in certain areas of The 
City. PIC consisted of about 14 frequencies, of 
which several were infrequently or rarely used, so 
most traffic was over only PIC 1,2,3,4 and 6. The 
new trunked system eliminated these problems 
almost completely, and I talked to several cops, all 
of whom like it much better than PIC. That is, once 
they got used to it: 

Here is how it works. 

The system consists of 21 or so individual 
frequencies which are shared by various services 
including police, county sheriff, parking and traffic, 
Department of Public Works (the people who blast 
you awake at 7 AM with a chorus of jackhammers) 
Animal Control, and quite a few others. 

When any radio in the system keys their 
microphone, the computer picks up the signal and 
assigns it to the first available, unused, frequency. 
Regardless of what service it is; police or 
dogcatcher. When the transmission ends, after a 
short delay, the frequency is clear and will be placed 
back in the "pool" waiting to be used by the next 
service that transmits. 

Now, to avoid the possibility that when a police 
officer has an emergency situation and needs to call 
the dispatcher and not end up talking to the 
dogcatcher, the system has a number of 'channels' 
called Talk Groups. When a radio, any radio, is set 
to a particular TG, it hears (and transmits) only to 
other radios that are tuned to that TG. Regardless of 
the frequency being used, only that particular TG. 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

Now, again using San Francisco as an example, there are hundreds of these TGs. The police have radios , Motorola, that 
can operate on any of three sets of TGs, A, B, and C, with each set having 16 TGs. There are two rotary switches, the first 
labeled for the set, A, B, C, and the second numbered from 1 to 16. Total of 48 TGs. All 16 of the A TGs are used and are 
assigned to particular areas of the city or for special events. So if you want to monitor the police, you have to select the TGs 
for your area plus some of those used for special events 

As of this writing, none of the C TGs are in use and many of the B TGs are used only under special situations. One of them is 
to track bank robbers using the RAT system. And once, I heard a raid on a suspected crack house. That was interesting. 
Especially what I could hear in the background! 

Riding the cable car home from work one day, I saw a bunch of 
SFPD vehicles parked around the Huntington Hotel, so I hopped 
off and trotted over to see what was happening. It was a 
demonstration having to do with Pacific Gas and Electric and I 
stayed for a while, talking to the demonstrators and several bored 
looking cops. 

"Uh, any chance you could tell me what Talk Group you're using'7 


Thanks. I pulled out my list to see which numbers to punch in to 

my PRO-91 to get A-2 and one of the cops asked, "What's that"? 

I explained that it was a list of talk groups, from Robert Kefty's 

book (see credits at the end of this article) and he asked if he 

could see it. 

Handing it to him I mentioned that there are a lot of TG I don't 

know about to which he replied with a laugh, "Hell, there's a lot of 

TG that WE dont know about." 

There are TGs reserved for the Mayor, the District Attorney's 
office, emergency services and the list goes on. 

The trunked system provides a great deal of 
necessary privacy for police that the old PIC system 
did not. With at least the 48 talk groups to choose 
from, they can quickly select one that normally isn't 
used much if at all.. 

So, this makes it difficult for the bad guys to stay on 
top of what the cops are doing - they can switch to any 
of the 48 TG as they wish - while still making it 
possible for we scannists with trunking radios to know 
what is going on in our neighborhoods, and to be able 
to call in the '20' of a bad guy we happen to spot. It 
doesn't happen that often but one I remember was for 
a 211-221; a guy with a gun who car-jacked; yanked a 
woman out of her vehicle at a red light and stole it. I 
got a call from the watch commander thanking me for 
being an "alert citizen". Using the trunked input 
frequencies (explained later in this article), makes it 
possible to stay on top of what is happening in your 

CAS: Computer Aided Scanning 

Monitoring has come a long way since the days when VHP was terra incognito, modifying the old Magnavox. From home built 
receivers to crystal controlled scanners and then the programmable models. And now - it had to happen - we have radios that 
can be interfaced to a computer. 

This means much faster scanning, and unlimited channels in as many 'banks' as the user desires. For example, you could 
make up a bank that scanned local police (if they are not using a trunked system) and fire department, or fire and Sheriff, or 
news media and dogcatcher and airport operations; whatever you like to listen to the most. The possibilities are unlimited. 

Practically any computer will work for CAS; it isn't necessary to spend two thousand bucks on a new Pentium Nil when a 
Pentium I will do the job. Many radios on the market are equipped with a serial port that plugs directly into the computer and 
include the software you need. And, some work with the Mac and probably Linux, too, so you aren't forced to use any 
Microsoft products. 

Or use your own program. There are a number of these applications available, some excellent, some only fair, two of which I 
have tried. First, there is Scan Star from Signal Intelligence. I have an older version and white it has no doubt been 
improved, it is the most versatile and powerful program I know of. It does many things besides just tune frequencies, 
including an on-screen spectrum analyzer, the ability to record audio transmissions on the computer's hard disk drive, and 
much more. Scan Star has a definite learning curve, it takes some time to master all of its many functions, but it is not 
necessary to learn all of them to be able to use its most important feature: controlling the radio. 

Another program is Radio Max from Future Scanning Systems. This is the one I use for several reasons. It costs much less 
than Scan Star, and does everything t need it to do. It is fast, has unlimited banks, interfaces to most radios, and it is very 
easy to learn to use. You can set it to announce time and frequency for each transmission, set delays for how long the radio 
waits until it moves on to the next frequency, and can record the transmissions as wav files. Demo versions of both Scan 
Star and Radio Max are available from the producers. 


Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 

The Future of Scanning 

Those of us who have been 
addicted to radios for many years 
will miss being able to listen to 
the things we once could. 
Cellular phones, for example. 
Radios made after about 1993 no 
longer can cover cellular, and 
while there are plenty of 
scanners that still do, most 
phones are digital so they are 
useless unless someone is using 
analog. Actually, to me it is 
boring, listening to people 
scream at each other over the 
silliest things such as who was 
supposed to pick up a quart of 


milk on the way home. I once worked as a technician for a company that manufactured automated cellular interception 
systems, and I had to listen to the calls they monitored in order to test them and get them ready to sell. And then, there was 
the guy who was driving around my neighborhood, in a Jaguar, talking for hours to a 900 sex line, b-o-r-i-n-g! Details are in 
The Phone Book, published by Paladin Press. 

Federal law enforcement agencies have digital encrypted radio systems as described above, and there is no way that we 
hobbyists are going to defeat them. But keep in mind that they don't always use '10-10'. They often transmit 'in the clear*. 

Local governments are switching to Trunked radio because it is a better and more efficient system. It also provides more 
privacy as described above, makes it much more difficult for the bad guys to monitor while we hobbyists can still hear them 
and call in when we see a bad boy. 

But Trunked is not necessarily encrypted (although some talk groups are digital) and trunking scanners are becoming less 
expensive as time passes. I got a Uniden PRO-91 on sale for $150.00 and while it doesn't have the bells and whistles of the 
more expensive models, it is a pretty decent receiver. Later, I moved up to a PRO-95. 

Eventually, the technology to monitor unencrypted digital transmissions, beyond will be available to hobbyists. And, of 
course, there will be many services that do not convert to these systems; they will continue to use analog. So even though 
the world of radio communications is constantly changing, for years to come there will be a great many signals to monitor. It 
all depends upon what you want to hear, and of course learning to hear! 

This article will, I hope, make the fascinating world of scanning a little easier for those of you who are just discovering it. 

The Last Word 

On the eleventh of September, I had just arrived at work to find the dispatcher and everyone in the shop huddled around the 
radio, wondering what was happening. They knew only that apparently an airplane of some kind had crashed into a building 
somewhere in Manhattan, t had my scanner with me as I usually do and turned it on white some of the people were 
probably wondering what I could hope to hear from New York. 

Since we were hearing it on the FM radio, the media was aware that something was happening and as I suspected, the local 
TV two way radio channels were very active; traffic was heavy. 

It took only a few minutes until i knew more than what was on the shop radio. That a hijacked airliner was on its way to the 
Bay Area. I didnt know how far away it was, so naturally I was concerned. 

I also activated the Emergency frequencies bank in case there was traffic from the HF Red Cross channels (nothing at the 
time) as well as police networks like NALEMARS and CLEMARS and also the rarely used frequency the local police can 
communicate directly with some federal agencies. 

When you have a radio like the PRO-95, you are ready for just about anything. It is good to be informed. 

I also have one of those little credit card radios, an Alinco DJ-C5 preset to the local ARES, Amateur Radio Emergency 
Service on 443.100 so I checked in to advise that I was available. And it is good to get involved. 


Thanks to Steve Unrig of SWS Security, for advice and proofreading this article. 


Computer Aided Scanning 

Scan Star is available from 

Signal Intelligence 

PO Box 640891 

San Jose CA 95164 


Radio Max is available from 
Future Scanning Systems 
120 NE DeBell, Suite 8 
Bartlesville, OK 74006 

Frequency Guides 

Grove Enterprises 

A nice selection of frequency listings, both books and CDs, and books on all areas of scanning including technical stuff and 

radio modifications. 

Robert Kelty, Mobile Radio Resources 

Mr. Kelty has compiled some of the most comprehensive frequency listings available. Local, State, Federal agencies and the 
military, his works include not just frequencies, but also repeater inputs, PL tones, codes and other useful information. Some 
are in book form, others on disk. 

Mobile Radio Resources 
1224 Madrona Avenue, San 
Jose, CA, 95125-3547. 

24 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

Frequency Allocation Chart 

Title: United States Frequency Allocations: The Radio Spectrum, March 1996 

Stock Number: 003-000-00652-2 

Poster, 30x40". Price: $6.00 

Description. Shews through color codes the parts of the radio spectrum that are allocated to each type of radio service. 

Order by mail: 

Superintendent of Documents 
P.O. Box 371954 
Pittsburgh, PA 15250-7954 

The chart may be available at, or can be ordered through GPO Stores. A list is at: 

Digital signals; Samples of many different data transmissions. 
Southeastern Wisconsin Monitoring Page 

Monitoring Digital Signals With Your Scanner htm 

Technical info on digital signals 

For those interested in the technical aspects, this site has a great deal of information including bit-streams and timing for 
many services. Published in 1 997, much of the data here still applies to current technology- 
Frequency Inversion Scrambling 
This site has technical information about Fl 
http.V/www.transcryptsecure. com/techcorner/scrames. html 

About the author 

M L Shannon is a San Francisco writer, relocated to New Zealand, author of several books and a dozen or so magazine 

articles on electronic surveillance and computer security. Credits are at 


For the most realistic, mind blowing kidnapping 
adventures anywhere period! 

Get kidnapped by our sexy Elite All Girls Team, or get 
your ass kicked by the hardcore and sinister Henchman! 

Its your choice, but you only live once! 

w w w 

M E K 

C O M 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 



By The Goldfinger 

Does anybody remember that TV show from 1996 called Profiler? Well, if your like me you watched that show religiously and 
was fascinated by Ally Walkers portrayal of forensic psychologist/profiler Samantha "Sam" Waters. Sam was a profiler in the 
FBI's VCTF; Violent Crimes Task Force. She had a special skill that enabled her to "think" in pictures and visualize a crime 
through the eyes of both the killer and the victim. The VCTF was in charge of investigating & solving violent crimes all over 
the US. The subplot was a serial killer known as "Jack", or "jack of all trades" who was obsessed with Sam after killing her 
husband years ago. Bailey Malone (played by Robert Davi) was her friend and mentor and headed up the task force. The 
show lasted for 4 seasons on NBC but Ally Walker only stayed on until the 1st 2 episodes of the 4th Season. No offense to 
Jamie tuner, her replacement, but the show just wasn't the same without Sam. At any rate, the show was top notch in my 
opinion and was about as entertaining as X-Files or the Pretender. However, TV tends to focus on the extraordinary aspects 
of such endeavors and downplays certain mundane aspects, as well as taking creative license with certain things there not 
sure about. 

For example, in real life, the "VCTF" is called the National Center for the Analysis of Violent Crime, located in northern 
Virginia.. The Center was created in 1984 and provides expertise to U.S. and international law enforcement (LE) agencies 
seeking help in solving violent crimes that are unusual, or particularly vicious or repetitive. 

The FBI profilers borne of TV scripts can "see" the crime in their minds They get vibes and psychic flashes as they walk 
around a crime scene, catching glimpses into the crime as it unfolded. NOT! There are no clairvoyants working in the FBI's 
Elite Serial Crimes Unit or more specifically; the Investigative Support Unit (ISU), formerly known as the Behavioral Science 
Unit. No, real profilers pour over evidence, police and autopsy reports and crime scene photos. 

They study the victim closely. Why was this particular victim chosen? What made this victim more appealing than someone 
else? They learn everything they can about the victim. 

And since behavior reflects personality, profilers are trained to think like the offender. 

They try to put themselves in their shoes to get inside their minds. Everything they see at a crime scene tells something 
about the UNSUB (unknown subject). 

These predators weave a tapestry of information as they commit these often disgusting and disturbing crimes. There are so 
many choices to make; who to target, when to strike, what weapon to use, where to dump the body... They can choose to 
take a life or spare it. 

Rape, mutilate, torture, kill, so many choices. But every choice has real consequences, and every move they make, and what 
ever they leave behind is a print of sorts, a personality print. 

Sort of like a behavioral fingerprint. A profiler will read the behavior from the crime scene and then begin to develop a profile 
of the UNSUB. Behavior is the key: What did the killer do that he didn't have to do? 

When attempting to link cases together, cases that could have been perpetrated by the same offender, profilers look for what 
they call the "signature". 

News, Hacking, Security, Forums, Text and more. 

.for the Mac Hacker 

The Underground Mac (UGM) is a site dedicated to providing macintosh users with all their hacking, Security, and 
Messaging needs. The site is was made to help the macintosh underground community which has risen and fallen 
over the years, and provide a good place for knowledge and tools. The site has grown and adapted to the 
community and is now one of the largest mac underground sites. The site has also grown a lot, It went from a small 
site to an enormous site with many sections and hundreds of megabytes In tools. This site also opened the doors 
for the network it Is now a part of and made it possible for many other great sites to rise. Ugm has expanded and 
helped the community greatly, and it will continue to do so and continue to grow as long as it Is around. It was 
started by me {SprattJ but is now the work of quite a few people and all of ifs content is made by great 
programmers which also play a huge role in the site. 


www. underground .com 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

A "signature" is sort of like an artists way of signing his work. Many of these creeps consider their stalking, torturing, and 
killing people their "work", as it does take up a significant amount of time. The signature is unique to the offender. It's often a 
ritual that provides some personal satisfaction, but isn't necessary to commit the crime. You don't have to torture someone 
repeatedly before you rape and kill them. You don't have to pose the body in a degrading fashion once the individual is 
dead .but they often do because it provides that extra satisfaction, hence the signature. It fulfills some sick internal need... 

Lets take a step back for a moment and look more closely at the history of profiling. 

The "godfather" of profiling was Howard Teten. He joined the FBI in 1962, and developed it through out the 1960's. Before 
joining the Bureau he was a police officer in California and was promoted to crime scene specialist white taking some 
criminology classes. His studies had made him look at crime scenes a little differently. He tended to focus more on 
psychology, and less on sociology. He, along with his partner, Pat Mullany, developed a training course in applied 
criminology and they taught the concept at road schools across the country. Road school is where FBI instructors go "on 
tour" out in the field and teach local police new techniques. 

They also teach at the FBI's National Academy. They are like short intensive training programs for LE officials to keep up to 
date with the latest LE tactics and techniques. 

Teten and Mullany continued to teach when the Behavioral Science Unit was formed in 1972. 

The fledgling unit did some informal profiling, but it wasn't officially sanctioned. 

Back then, the FBI was still "just the facts, ma'am", and Behavioral Science or "B.S." (bullshit) as many at the FBI referred to 
it as, was considered maybe one step removed from witchcraft or voodoo. They had to tread lightly. 

In the late 1970s, agents Robert Ressler and John Douglas brought a new dimension to profiling. 

The new dimension was interviewing the killers themselves to gain insight. While teaching at road schools, they began 
stopping at nearby prisons and interviewing killers, rapists and other violent criminals. They wanted to know why these guys 
committed these crimes and they found that most of them were willing to talk. And why not? Most of these guys were gonna 
be on ice for life or were already on death row. According to John Douglas, some of these guys did feel remorse and felt that 
maybe by participating in a psychological study they might somehow make some partial amends and perhaps gain a better 
understanding of themselves in the process. 

Others were crime buffs, and just like being around cops and FBI agents. Many of these type of offenders opted for careers 
in LE, but couldn't hack it, so they gravitated towards jobs like security guard or night watchman. They often buy old cop cars 
and outfit them with police style equipment. Some of the offenders think that if they cooperate with the "authorities" they 
might benefit somehow, though they were never promised anything, according to Douglas. 

Some of them simply felt ignored and forgotten and wanted an opportunity to relive their murderous deeds in graphic detail. 
For others, it was simply relief from boredom that a visit from the FBI represented. 

However, talking with FBI agents in prison is not always a smart move. The walls of the prison hear everything, and you don't 
want to be thought of as a rat, so they were careful not to put the prisoners lives in jeopardy. They would often drop in 
unannounced for impromptu interviews, that way it looked like they were merely being questioned about some crime. You 
might ask yourself; why would they even take such a consideration for these sick bastards that killed and raped women and 
children and tortured people to death? The answer is because they knew that this information was going to be vital and the 
insight gained by these people was going to be priceless, more importantly, it was going to help save lives in the future. Plus, 
these guys were already paying for their misdeeds and so there was no reason to compound it by making their miserable 
lives any harder. 

John Douglas made an analogy that "you can learn a lot about the artist by looking at his work, but you learn even more by 
talking to the artist himself in his fascinating and riveting New York Times bestseller; Mind Hunter Inside the FBI's Elite 
Serial Crime Unit. 

They were learning more and more with each prison encounter, but they needed to figure out a way to organize the research 
information into a usable framework. That step came through Roy Hazelwood who had done some research with Ann 
Burgess, a professor of psychiatric mental health nursing at the University of Pennsylvania School of Nursing and associate 
director of nursing research for the Boston Dept. of Health and Hospitals. She was already a prolific author and widely known 
nationally as an authority on rape and its psychological consequences. 

Roy introduced her to Bob Ressler and John Douglas. He explained to her what they were trying to do, she was impressed, 
and agreed to work with them. Ann then pursued and obtained a $400,000 grant from the National Institute of Justice. The 
goal was to interview 36-40 incarcerated felons and see what conclusions could be drawn. Ann and the boys developed a 57 
page instrument to be filled out for each interview. John and Bob conducted most of the interviews, documenting pre and 
post offense behavior, then Ann would crunch the numbers, an they wrote up the results. They expected the project to take 
3-4 years, and in that time, criminal investigative analysis came into the modern age. 

By 1983, they had completed a study of 36 individuals, and collected data from 1 1 8 of their victims, mostly women. Out of the 
study came a system to better understand and classify violent offenders. With this system, they were now able to link what 
was going on in a perp's mind with the evidence that he left at the crime scene. This in turn, helped them to hunt, catch, and 
prosecute more effectively. In 1998, they expanded their conclusions into a book, entitled 

Sexual Homicide: Patterns & Motives published by Lexington Books. 

Still, even with all they learned, they admitted in their conclusion, "this study raises far more questions than it answers". But 
thanks to this pioneering work, todays profilers base much of their accumulated knowledge on those very interviews. 

Blacklisted! 41 1 Volume 6 Issue 3 - Summer 2004 27 

Reading about such things we tend to focus on the flashy, glamorous aspects of it all. 

It all sort of unfolds like a TV show. You find out someone was brutally killed, cops arrive, then the FBI gets involved for one 
reason or another, a profiler enters the picture, the media writes up more stories, etc, etc. etc. But what about the person that 
was murdered? Of course you thought about that, you probably feel bad for them, and their family as well. You might have 
even seen a picture in the paper of a body partially covered, or a body bag being loaded into a ambulance. 

What we don't see is the crime scene, as it was when LE first arrived. We don't see the crime scene photos or know about 
the brutal torture, humiliation, domination and control that probably played out minutes or hours before this persons life 
stopped. If we did, many of us would feel nauseous, perhaps vomit. Many of these crime's are so horrific that even seasoned 
homicide cops are shocked and appalled by what they've seen. 

In the case of every horrible crime since the beginning of civilization, there is always that burning fundamental question: 
"What fond of person could have done such a thing?" Stories and legends that have filtered down thru the ages about 
witches, werewolves and vampires may have been a way of explaining outrages so heinous, no one could comprehend a 
person actually doing. These stories were probably a way to somehow explain these crimes. Monsters had to be 
supernatural creatures, because they couldn't possibly be like us. Unfortunately, this is seemingly not the case. Every single 
murderer/rapist/serial killer in prison today is human, not one vampire or werewolf yet. 

The Scene of the Crime 

The crime scene is where profilers begin the hunt. Scenes can be brimming with evidence like blood, semen, fingerprints, a 
weapon, hair and fibers or it can be seemingly picked clean without any trace or link to the offender. Either way, the scene 
still tells them a lot and provides direction. Profilers will attempt to characterize a crime scene and the offender as either 
"organized" or "disorganized". In layman's terms, an organized offender's crime is premeditated, perhaps carefully scripted, 
while a disorganized offender acts with little or no planning, often taking advantage of "victims of opportunity". There is also a 
"mixed" category for offenders who exhibit both types of behaviors. 

A perfect example of an organized offender is Dr. Hannibal Lecter. In the movie Silence of the Lambs, Lecter displays 
classic organized offender behavior. He is manipulative, cunning, deliberate and methodical. He's clean cut, takes pride in his 
appearance, and seemingly has no empathy or remorse for his actions. He's very articulate, and pleasant enough on the 

Because of this ability to appear non-threatening, individuals like this are able to snare their victims by charming or conning 
them. Lecter appears to be a classic psychopath, and a genius, which makes him that much more dangerous. 

Organized offenders usually plan out and execute their crimes very methodically. 

They usually target their victims and prey primarily on strangers. They bring their own weapon and make sure to retrieve any 
spent shells/cartridges, bloody implements, restraints, etc. or other evidence when they leave. They usually will attempt to 
conceal the body, hiding or dumping it in another location. The whole crime, from the planning stage, to its conclusion is gone 
about in a organized way. "Control is of the essence for the organized offender." according to Bob Ressler in his book, 
"Whoever Fights Monsters". 

Disorganized offenders, on the other hand, are usually loners with poor social skills. 

They often feel inadequate and just have a hard time relating to people or forming normal relationships. They tend to be 
disheveled in appearance, and their homes are often unkept as well. Their crimes are often committed on impulse and 
against victims of opportunity. 

No one is safe from this time of offender, friends, family, neighbors, acquaintances- everyone is fair game. The spark that 
sets them off can be a result of mental illness, or drugs and alcohol. 

These crime scenes might display victims that were mutilated beyond comprehension and there may be signs of overkill. 
Ressler says in his book that a disorganized crime scene "displays the confusion of the killer's mind and has spontaneous 
and symbolic qualities that are commensurate with his delusions." 

In general terms organized criminals tend to be older, and more matured than the disorganized criminal. Disorganized 
criminals attack closer to home or areas they frequent. Organized predators like to put some distance between their crimes 
and themselves. 

Then there's the "mixed" category. Crime scenes with elements of both sophistication and chaos would point to an offender 
with mixed characteristics. Possibilities include a young offender making the transition from disorganized to organized 
criminal; or perhaps a person who has a short temper but can maintain enough control to avoid taking unnecessary risks; or 
stressors and an inability to control the victim, resulting in a change in the offender's behavior. 

Mixed behavioral patterns can also point to another real possibility: more than one person participated in the crime. 


The word "fantasy" is standard in the vocabulary of profilers. You'll hear it over an over again. 

Many of the crimes they investigate are actually fantasies that were acted out. 

"Probably the most crucial single factor in the development of a serial rapist or killer is the role of fantasy," Douglas says in 
his book, "Mindhunter." Serial murder and rape, like most predatory crimes is fueled by fantasy. These fantasies combine sex 
and violence, and though there is often a sexual aspect to the crimes, the sex is often really secondary to power, control and 

28 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

Many of these types of offenders feel powerless in their own lives and believe they can overcome this by controlling others. 

Fantasy continues to play a significant role in the offender's life even after the crime has been committed. Many will replay 
the events in their mind allowing them to relive the crimes indefinitely. Many killers keep trophies as well, mementos of the 
crime that feed his fantasies. A killer might take jewelry from a victim, which he might give to his wife, girlfriend or mom. 

He might take a drivers license, a lock of hair, underwear, etc. 

He may clip newspaper articles about the crime and keep a journal. He may even take a severed body part, or parts, in order 
to extend the fantasy. 

When an offender commits a crime, he views it as an accomplishment and likes to keep it going, like a former athlete who 
pops in an old playoffs tape to relive old glories. 

Incarcerated offenders relive their crimes so often that they car* provide profilers with very specific details during interviews. 

"Right in front of you, they will begin to relive the crime and fantasize," says Jim Wright, former FBI profiler. The crime may be 
over, but these guys are constantly replaying it in their head, like a favorite song. 

So you wanna be a Profiler huh? 

Well, it ain't gonna be easy. The FBI is more selective than Harvard. Here's the basics. 

First, you gotta get accepted to the FBI and become a special agent (SA). These are the MINIMUM requirements. If you don't 
meet all these criteria, there's no way you'll get into the Bureau as a SA. 

• must be a U.S. citizen or a citizen of Northern Mariana Islands 

• you must be at ieast 23 years old an no older than 37 when you apply 

• you must have uncorrected vision that's no worse than 20/200; your corrected vision must be 20/20 in one eye and no 
worse than 20/40 in the other eye. You must also pass a color vision test to check for color blindness. 

• must have a valid drivers license 

• you must have a DEGREE from a 4 year resident program at an accredited college 

• you must pass a thorough investigation, which includes the following: 

Background check * 

Drug test: Note to those that don't consider mary-jane a drug; If you've toked in the last 3 years, or if you've taken ANY illegal 
drug in the last 10 years, your out. 

Polygraph exam: you'll be asked about your criminal & drug history, etc. Basically, if you got a clean record you got nuthin to 
worry about. 

Finally, and this isn't "on the books" or official, but the Bureau really doesn't even look at applicants until they have at least 3 
years work experience. This is what you have to do before you can even think about getting into profiling. And in those 3 
years of getting work experience, who knows where you'll end up or what other programs you might gravitate towards? 

How do you get the kind of experience they would be interested in? 

Can you say free internships? Hit up every alphabet soup agency you know and tell 'em you'll work for free. Sooner or later, it 
might turn into a paid gig, meanwhile your learning the ropes from experienced pro's in the field, getting' your resume 
together, and getting' that all-important work experience the FBI wants. 




OUR 8 th YEAR IN BUSINESS (407)650-2830 

Blacklisted! 41 1 Volume 6 Issue 3 - Summer 2004 


Hackers getting a bad rap from the media 

By: Double-O-Jake 

Early on, computer and technical wizards who bore the honor of being 
called a "hacker" were highly regarded by their peers and the media 
because of their ability to work around problems and "fix" everything. In 
the most generic use of the term, famous people such as Thomas Edison, 
Nicola Tesla, Steve Wozniak, Bill Gates and even Henry Ford would easily 
fall into the category of the title of "hacker". Yes, they all thought outside 
of the box and rose above normal thinking - to produce the things we've all 
come to enjoy and take for granted. 

Somewhere along the way, the name "hacker" became synonymous with 
"criminal". It was in the early 80's some time after the movie War Games. 
This was the pivotal time when the media began to bastardize the term. , 
Some say that definitions change and hacker now means nothing more 
than criminal and, "its too bad, deal with it." Perhaps, but remember, just 
because people say it, doesn't mean it's true. 

Hackers truly are given a bad rap and it's a shame. For all the hard work ^t^P^--- 
they put into what they love so much and the gigantic leaps in technology and understanding we *all" gain from them, it's sad 
the one term reserved which encompasses anyone who fits the bill as a smarty-pants has been dragged through the mud. 
To most of the media, an everyday criminal tagger, who just happens to tag a phone booth, must be a hacker. Hackers are 
blamed for everything from cable channels blinking out and static on the phone line to satellites dropping from the sky and 
power outages. 

You really can't blame people for thinking hackers are criminals. That's all they ever hear. Day after day, they are 
bombarded by news headlines which profile hackers as criminals. Your every day Joe Blow isn't going to dig any further to 
find the truth — they'll just take it for face value and file it away until the next office meeting, when they blame hackers for 
their server going down. Oh, a hacker must have done it! And the viscous path of misinformation continues. 

Really, the mainstream media is to blame for the general public's belief that hackers are criminals by their flashy <and very 
misguided> use of the term. The media loosely uses the term hacker to describe anyone who gains unauthorized access to 
a computer system to destroy files, steal information or some other illegal act. Titles like, "Hacker breaks into Pentagon 
Computer," "Hackers are stealing your credit cards," "Hackers are watching you," etc. ..are used for hype value and really only 
help to fuel the public's lack of understanding of the hacker culture as well as the good nature of the hacker community. 

Hacker community? There's no community of hackers! ....right? Wrong again. There are thousands of hackers around the 
world who openly admit to being a hacker. DEFCON, a yearly convention for hackers held in Las Vegas, NV is the premier 
hacker meeting place. Each year, you'll find 5000+ hackers who show up, have a good time, party and then go back to their 
normal lives at the conventions end. You'll find people that look just like you, like your neighbor next door, your teacher, even 
your parents. There are no boundaries on age, gender, race or technical background. If you read between the lines, yes 
there are girl hackers. Pretty cool, huh? 

This community is a shared culture of expert programmers, networking wizards, electronic engineers, musicians and 
scientists that traces its roots back through decades to the first time-sharing minicomputers. The members of this very 
culture originated the term 'hacker*. Hackers built the Internet. Hackers made the Unix operating system what it is today. 
Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to it and 
other people in it know who you are and call you a hacker, you're a hacker. 

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a 

Want to advertise to a target 

audience of computer and 

electronic enthusiasts? 


It's inexpensive and a great way to 

advertise to people with the "right 

stuff." Contact us for details. 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

hacker, you have to behave as though you have this kind of attitude yourself, 
attitude, you have to really believe the attitude. 

And to behave as though you have the 

Mainstream media writers will argue that any use of the term "hacker" defined in any other sense than "criminal" is a 
misguided attempt to hold onto an old school belief. Further, they will surely argue that a hacker "breaks into systems, 
therefore they are criminals." This argument is flawed. A hacker doesn't necessarily "break" into systems. Somewhere, the 
media got ahold of this idea that hackers break into computer systems. Again, probably because of "War Games" where the 
main character unwittingly gained unauthorized access to a military computer which controlled nukes. People who do 
knowingly break into computer systems by circumvention of the security measures are performing a criminal act. I won't 
argue the point, neither will most other hackers in the world. Understand what you're writing about, then maybe you can 
make an informed presentation for readers to enjoy rather than another sludge-fest-beat-up-the-evil-hacker article. 

In the mid 80's in direct response to the journalists misuse of the term hacker, the alternate term "cracker" was created. The 
hacker culture came up with this term to help direct the media <and themselves> to describe the criminal-minded types who 
broke into computer systems and did the awful things hackers were being blamed for. For nearly two decades there has 
been a fierce fight over the topic of cracker versus hacker. The pro-hackers have been working hard to help the media and 
public understand the difference. The media, while generally still using the terminology incorrectly on a regular basis, has 
persuaded a few open-minded journalists to hop on board the hacker band-wagon. Realizing there is a difference, they 
make this distinction in their writings. Hooray. There is a bit of good news. 

A Quickpoll conducted by ZDNN in 1998 helped prove the point that people are starting to come around. More than 3000 
people were polled and 78% of those polled understood the difference. "Hackers are Noble. Crackers break the law." 
Another WIN for hackers of the world. 

In addition, currently there are several sources online which define the hacker in a warm light. 

Wired Style: Principles of English Usage in the Digital Age - 

They state that a hacker is "not synonymous with computer criminal or security breaker." 

Jargon Dictionary (version 4.4.7) - 

They define hacker as the following: "1. A person who enjoys exploring the details of programmable systems and how to 
stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs 
enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person 
capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or 
one who frequently does work using it or on it; as in 'a Unix hacker'. (Definitions 1 through 5 are correlated, and people who 
fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who 
enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler 
who tries to discover sensitive information by poking around. Hence 'password hacker 1 , 'network hacker*. The correct term 
for this sense is cracker." 

Please note that they correctly make mention of the term "cracker". 

Wikipedla - 

They define hacker as the following: "A hacker is anyone who enjoys the intellectual challenge of creatively overcoming or 
circumventing limitations, primarily in their fields of interest, namely programming or electrical engineering. As will be 
discussed below, there is a trend in the popular press to use the term to describe computer criminals, and others, whose 
motivations are less pure than the traditional hacker. This trend greatly annoys many of those old-school computer/ 
technology enthusiasts." 

So, what does all of this mean? It means that there's a chance the hacker name may finally be somewhat rid of the stigma of 
criminal overtones sometime in the future. As the mainstream media journalists take care in their writings and online 
dictionaries correctly make the distinction between hackers and crackers, the general public will slowly become more 
educated on the topic. As this happens, so will the good name of hackers be restored. This along with media coverage of 
DEFCON and old school hackers who are now CEO's opening up about their past as a hacker really helps people 
understand that hackers aren't bad - they're just people.... who are skilled at <and passionate about> their interest in 
technology. No longer will the hacker need cringe before he <or she> states in mixed company that they are in fact a hacker. 


We want to hear from our readers and get some Input on every topic from the articles we print to the 
content on our website. If you have any ideas, comments, complaints or suggestions, the best way to get 
something done about it is to contact us and let us know what you're thinking. We are a magazine written 
for the hacker community. We want to have the best possible magazine with the most fresh Ideas and 
subject matter. This is your chance to help out and get something done. Don't fall prey to the thought, 
"what I think won't matter" or "let someone else do it." You can make a difference! 

We want to hear from hackers, event coordinators, group leaders, graphic artists, writers, creative 
assistants, magazine editors, system administrators, forum moderators, webmasters, photographers, 
electronic hobbyists, design engineers, technical writers, field technicians and anyone else who is 
interested in the hacker community in any way. Here's how to contact us: 

Blacklisted! 411 Magazine 
P.O. Box 2506, Cypress, CA 90630 


Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

The Black Market 

THE WORLDWIDE WARDRIVE is an effort by security 
professionals and hobbyists to generate awareness of the 
need by individual users and companies to secure their 
access points. The goal of the Worldwide WarDrive (or 
WWWD) is to provide a statistical analysis of the many 
access points that are currently deployed. http://www. 

LOCKPICKIN6101.COM Open forum discussion to educate 
yourself and others about lock picking and lock security. 
HACKER ART WANTEDI We're actively recruiting people 
to submit artwork to us. We're looking for freehand as well 
as computer artwork of technology, people using technology, 
events, devices, utility personnel, utility vehicles in action (or 
doing nothing at all), tradeshows, technology swap meets 
and hacker meets, comics, etc. If it's related in any way, we 
want artwork!! Blacklisted! 411 Magazine, P.O. Box 2506, 
Cypress, CA 90630 
new 320 page book covers scanning from A to Z. "Useful, 
knowledgeable, and readable" (Popular Communications). 
"Wry, cynical, and immensely entertaining" (Paladin Press). 
"A must for the radio monitoring enthusiast" (Radio Monitors 
of Maryland). "An enormous collection of information. ..plenty 
of great reading" (Monitoring Times). "You can't 
miss" (American Survival Guide). "A high point of scanner 
publication" (RCMA). Only $19.95 + $3 S&H. Check, Money 
Order to Index, 3368 Governor Drive, Ste. 273-N, San Diego, 
CA 92122. Credit cards only, 800-546-6707. Free catalog of 
insider books on scanners, cellular, eavesdropping, cable, 
much more. 

CELLULAR TELEPHONE. Reprogram from your computer, 
Motorola bag changed in minutes. Compare, ours is at a 
much lower cost. Software & manual $199. Loader phone 
available. Voice or FAX (903)389-8352. Call now MC/ 

HACKERSHOMEPAGE.COM - Your source for Keyboard 
Loggers, Gambling Devices, Magnetic Stripe Reader/Writers, 
Vending Machine Defeaters, Satellite TV Equipment, 
Lockpicks, etc.. (407)650-2830 

HACKER STICKERS Geeks, Coders and Hackers get your 
stickers, shirts, hardware and caffeine from www. 

Series $100, 8000/Brick Series $150, Mobile/Bag: $100 
(includes handset jack, the only way to program Series 1). 
Panasonic and Mitsubishi Cables $100. All cables are high 
quality, professionally assembled and guaranteed. Guide to 
Cellular Programming, everything you ever wanted to know, 
correct wiring diagrams, troubleshooting, etc.: $45. Other 
accessories and programming software available. Inquiries 
to: (714)643-8426, orders only to: (800)457-4556. C.G.C. 
HIGHLY COLLECTIBLE INTEL 4004 Processors. We have 
these available in NEW OLD STOCK condition. Ceramic as 
well as plastic. Ceramic "D4004" $70. Plastic "P4004" $40. 
Shipping cost of $6 not included. We also have P4001/ 
P4002 support devices available @ $26 each, shipping 
included. Gl Electronics P.O. Box 
11029, Westminster, CA 92685 

thousands of readers in the US, Canada, Japan, the UK, 
Australia, and elsewhere. Join our long list of satisfied clients 
who have made Blacklisted. 411 their vehicle for reaching 
customers. Blacklisted! 411 Magazine, P.O. Box 2506, 
Cypress, CA 90630 
More than 20 performance enhancements for PRO-2004 and 
PRO-2005. Restore cellular, increase scanning speed, add 
6,400 memory channels, etc. Step by step instructions, 
photos, diagrams. Only $17.95, + $3.50 hipping ($4.50 
Canada). (NYS residents add $1.38 tax.) CRB research, Box 
56BL, Commack, NY 11725 Visa/MC welcome. (516)543- 

HIGH-TECH security/survival books/manuals: Computers, 
Internet, Phones, Energy, Physical Survival, Financial, Law, 
Medical/Radionics, Mind Control, Weird/Paranormal. Free 
Online Catalog at: (PO 23097. ABQ, 
NM 87192), or $3 hardcopy (USA/Canada, $7 foreign). See 

SIX DIGIT LED CLOCKS (with seconds); AC powered, 
highly accurate. Several models. Free catalog! Whiterock 
Products, 309 South Brookshire, Ventura, CA 93003. (805) 

COMPUTER REPAIRS for Atari, Commodore, Coleco, 
Sinclair/Timex, Osborne, Tl, TRS-80 and IBM compatible 
Reasonable flat rate plus parts and shipping. Buy/Sell/Trade/ 
Upgrade. SASE appreciated. Computer Classics, RT-1 , Box 
117, Cabool, MO 65689. (417)469-4571. 
CELL PHONE cloning for the guy who has (two of) 
everything. Must have current service contract. For more 
info, call Keith (512)259-4770. 6426, Yuma, AZ 85366-6426. 
BUILD A RADAR JAMMER out of your old radar detector. 
No electronic knowledge needed. Only $9.95 + $2.50 S&H 
Call 24fr. for easy step-by-step plans. 1-800-295-0953 Visa/ 

SEARCH AND SEIZURE. What you need to know before 
they knock on your door. Send $8 to Veritas Publishing P.O. 
Box 14137 Pinedale, CA 93650. 

BOGEN FRIDAY FR-1000 all digital answering machines. 
An excellent all-purpose digital answering machine with 8 
mailboxes (4 announcement only). Has a total recording time 
of 18 minutes. $52 each including shipping. Gl Electronics P.O. Box 11029, Westminster, CA 

ALL YOUR 802.11B ARE BELONG TO US Unlike any other 
database system that exists since or during the period of "the 
collective" (2002), none other has given a return of the entire 
collective back to the submitter. The collective is not a 
mapping database system. It is a mechanism to exchange 
data in a cumulative fashion for such interested parties 
through anonymous assimilation. http://www. 


BLACKLISTED! 411 MEETINGS We know some of the 
diehards kept the meetings going while we were out of print. 
Thanks guys!! You need to contact us and let us know the 
details of your meetings so we can list you in the magazine. 
For everyone else. Would you like to start up a meeting, 
yourself? It's fun, it's easy and you get a free subscription 
out of it. Tell us where you want it held and give us a contact 
name and number or email address. If you want your free 
subscription, you'll need to provide an address, of course. 
Think about starting a meeting yourself. Blacklisted! 411 
Magazine, P.O. Box 2506, Cypress, CA 90630 www. 

SCIENTIFIC ATLANTA 8580 $225, 8570 $250, 8550 $150, 
8500 $120. Will program your 8550. 8500 EAROMS for 
$7.50. Cable security key gets past collars $25. Add $5 
shipping. No TX sales. Send money order to: K. Perry, PO 
Box 816, Leander, TX 78646-0816 Phone: (512)259-4770. 
right in your area without the use of a dish or any other 
expensive receiving equipment. Thousands of these 
programs are operating today across America. Programs 
may include talks shows, weather, sport events, news feeds, 
financial reports, music programs and data ports. This 
technology is received through a high tech. SCSRT1 card. 
Find out today what you have been missing! (800) 944-0630. 
Credit card orders accepted. 

portables, includes a battery (but no charger) forty number 
alpha memory, good working order, available as an extension 
to your existing line for $279, or as is for $129. Orders only: 
(800)457-4556, Inquiries to: (714)643-8426. C.G.C. 
HOME AUTOMATION. Become a dealer in this fast growing 
field. Free information. (800)838-4051. 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


TIRED OF SA TEST KITS with marginal or inconsistent 
performance? 21st Century Electronics and Repair 
guarantees peak performance with 40-pin processor kits. 
New, more flexible program with additional features puts 
others to shame. Price $49 each or 5 for $233. 1st time 
offered. (404)448-1396 

Secret" registry of government frequencies, New 8th edition. 
268 pagesl FBI, DEA, Customs, Secret Service, BATF, 
Immigration, Border Patrol, IRS, FCC, State Dept, Treasury, 
CIA, etc. & surveillance, bugs, bumper beepers, worldwide 
US military, 225 to 400 Mhz UHF aero band, Canadian 
listings, & more! Ultimate "insider's" directory! Standard 
reference of law enforcement, news media, private security, 
communications industry & scanner owners. $21 .95 + $4.00 
shipping ($5.00 to Canada). NY State residents add $2.21 
tax. CRB Research Books, Box 56BL, Commack, NY 11725. 
Visa/MC welcome. Phone orders (516) 543-9169 weekdays 
(except Wednesday) 10 to 2 Eastern. 

DESCRAMBLER EXPOSE, 160pp, illustrated, with vendor 
lists for chips, parts. Law, countermeasures, much morel 
$23.95 + $3 S/H. Check/MO. INDEX, 3368 Governor Dr., 
Ste 273, San Diego. CA 92122. Credit cards only: (800) 
546-6707. Free catalog of "insider" books on scanners, 
cellular, credit, eavesdropping, much more. 
TOP SECRET SPY DEVICES Home of the Worlds' Smallest 
Digital Voice Recorders and Spy Cameras. We stock many 
items including: Transmitters, Bug Detectors, Audio 
Jammers, Telephone Recorders, Lock Picks, Voice 
Changers, Keystroke Loggers, 

one-stop, cutting-edge mail-order source for over 1 ,000 titles. 
Beautifully illustrated 128-page catalog includes: alternative/ 
fringe science, conspiracy, Forteana, sexuality, computer 
hacking, UFOs, and much more. Send $3.00 to Xines, Box 
26LB, 1226-A Calle de Comercio, Santa Fe, NM 87505. 
WEB SITES We have a list of hundreds of interesting and 
unusal web sites. Some of the sites are related to this 
magazine and some are not. Hacking, phreaking, breaking 
the law, sovereign citizenship, lasers, electonics, surplus, 
credit, etc.. You have to check this out! Save hundreds of 
hours of time by getting our list. We will provide the list on 3- 
1/2" disk and you can load it directly into your web browser 
and click on the links OR we can provide the list on paper - 
whichever you prefer. Send $5 to TCE Information Systems, 
P.O. Box 5142, Los Alamitos, CA 90721 
FM STEREO TRANSMITTER KIT. Transmitter broadcasts 
any audio signal from a CD player, VCR, or cassette player 
to FM stereo radios throughout your home and yard. Uses 
the unique BA1404 IC. Tunable across the FM band, runs on 
1.5 to 12 volts CD. PC board/components, $24. Visa/MC. 
TENTRONIX, 3605 Broken Arrow, Coeur d'Alene, ID 83814. 

CALLING ALL WRITERSI We want YOU to write for us. 
We're looking for articles related to the hacker "scene", 
technology reviews, opinions on issues, etc. If you submit an 
article for print and we use it, we'll pay you $25-$600, 
depending on length, content and the use of additional 
material such as (diagrams, photos, pictorials, schematics, 
etc). We require all photos to be 3 Omegapixet or greater. 
JPG format Is acceptable. Blacklisted! 41 1 Magazine, P.O. 
Box 2506, Cypress, CA 90630 www.blacklisted41 1 .net 
TRUE TAMPER-PROOF Security Screw Removal Bits. The 
super torx kit includes: T-10, T-15, T-20 & T-25. Complete 
set for $19.60. TOCOM 5503 bit $8.95. TOCOM 5507 bit 
$19.95. Zenith PM/PZ-1 bit $10.95. Jerrold Starcom bit 
$19.95. Pioneer (oval) bit $23.95. Oak Sigma (oval) bit 
$23.95. Security Screws available. Tamper-Bit Supply Co. 

CELLULAR RESTORATION on your 800 Mhz scanner 
performed expertly for $40 including return shipping. 
Guaranteed. Offer expires soon. Keith Perry, 607 Osage 
Dr., PO Box 816, Leander, TX 78641. (512)259-4770 
6.500 MHZ CRYSTALS $4 a piece, 50 for $115, 100 for 
$200. Add $3.00 for shipping Send checks to C. Wilson, P. 
O. Box 54348 Philadelphia, PA 19105-4348 

GET THE ULTIMATE CD-ROM! The virus-base contains 
thousands of fully functional computer viruses, virus 
construction toolkits and virus related info. $99.95 + $7.00 
express shipping. Better hurry! American Eagle 
Publications. P.O. Box 41401, Tucson, AZ 85717. 
OBSOLETE COMPONENTS Are you looking for an old IC 
you can't seem to find anymore? We have a very wide 
variety of hard to find and obsolete components available. 
Check us out. Odds are, we have the part you need or can 
find it for you. Gl Electronics P.O. 
Box 1 1029, Westminster, CA 92685 

COIN-OP VIDEO ARCADE GAMES. Parts, boards, and 
empty cabinets available for your projects. Cabinets 
available for $75. C.J. Stafford, (301)419-3169. 
WANTED: FEATURE FILM JUNKIE who can access up-to- 
date FAX numbers for hot agents and/or producers & 
directors. My objective: to bring to their attention my action- 
thriller script. Can pay by the hour. (909)275-91 01 
Interactive Q&A on bugging, wiretapping, locks, alarms, 
weapons and other wonderful stuff. Test your knowledge of 
the covert sciences. Entertaining and VERY educational. 
Includes catalogs of selected (no junk) shareware and 
restricted books. Send $1 .00 for S.25 disk, $1 .50 for 3.5, plus 
two stamps, to: MENTOR PUBLICATIONS, Box 1549-W, 
Asbury Park NJ 07712 

6.500MHz or 6.5536MHz CRYSTALS Your choice. $4 each 
No shipping charges. Send to TCE Information Systems, 
P.O. Box 5142, Los Alamitos, CA 90721 
ANARCHY ONLINE A computer bulletin board resource for 
anarchists, survivalists, adventurers, investigators, 
researchers, computer hackers and phone phreaks 
Scheduled hacker chat meetings. Encrypted E-mail/file 
exchange. WWW: hhtp:// Telnet: Modem: 214-289-8328 
WAR DRIVING IS NOT A CRIME The benign act of locating 
and logging wireless access points while in motion - 
Wardriving is NOT a crime, being stupid should be. http:// 

ARE YOU A PHOTOGRAPHER? With the increasing 
number of high resolution digital cameras in the hands of our 
readers, we're actively recruiting people to submit photos to 
us. We're looking for 3.0megapixel or better digital photo's of 
technology, people using technology, events, devices, utility 
personnel, utility vehicles in action (or doing nothing at all), 
tradeshows, technology swap meets and hacker meets. If it's 
related to hacking in any way, we want photographs!! 
Blacklisted! 411 Magazine, P.O. Box 2506, Cypress, CA 
90630 www.blacklisted41 1 net 

HACK THE PLANET A new and exciting board game in 
which 2-4 players race to complete a hacking mission. 
Please send $3.00 check or money order payable to CASH. 
Hand-scanned 99XX exchanges in 516 AC. Included may be 
data kit modem numbers, WFA/FA, SSCU, TSAC(SCC), 
CO#'s, etc. Send $2.00 check or money order payable to 
CASH and specify exchange. "MCl-Style" Phone Patrol hats 
are now available! Just $18 check or money order payable to 
CASH. 2447 5th Ave, East Meadow, NY 1 1 554. 
plans, kits & assembled electronic "TOOLS" including the 
HARD-TO-FIND equipment at LOW PRICES. Send $1.00 to 
M. Smith-02, P.O. Box 371, Cedar Grove, NJ 07009 
LIMITATIONS, How anyone can win $10K fine for this simple 
violation of your rights. Open a bank account without a SSN 
$5 plus 3 F/C stamps. Obtain a major credit card without a 
SSN (making it impossible for a bank or any institution to 
check your credit history or records) $25 plus 5 F/C stamps. 
For info send $1 and LSASE to: Know Your Rights, c/o R. 
Owens, 1403 Sherwood Dr., Bowling Green, KY 42103 NO 
CHECKS PLEASE. M/O or FRN's only. 
HARD TO FIND 6502 6800 68000 Microprocessors. We 
have a wide array of very hard to find microprocessors and 
micro support devices available. If you need it, we probably 
have it. Gl Electronics P.O. Box 
1 1029, Westminster, CA 92685 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

VOICE CHANGING ACCESSORY. Digital voice changing: 
male to female, female to male, adult to child, child to adult. 
Use with any modular phone. 16 levels of voice masking. 
Connects between handset and phone. STOP THOSE 
ANNOYING TELEPHONE CALLS! Sound older and tougher 
when you want to. Not a kit. Fully assembled. Use with 
single or multi-line phones. 30-day refund policy. Ask for 
free catalog of our products. VISA/MC ok. Xandi 
Electronics. 1270 E. Broadway, Tempe AZ 85282-5140. Toll 
Free order line: (800)336-7389. Technical Support; (602) 

MAGENCODERS.COM Manufacturer of the World's 
Smallest Portable Magnetic Card Reader & Point of Sale 
Data Loggers. We also have Magnetic Stripe Reader/ 
Writers, Smart Card Loaders & Copiers, etc... (407)540- 

UNDETECTABLE VIRUSES. Full source for five viruses 
which can automatically knock down DOS & windows (3.1) 
operating systems at the victim's command. Easily loaded, 
recurrently destructive and undetectable via all virus 
detection and cleaning programs with which I am familiar. 
Well-tested, relatively simple and designed with stealth and 
victim behavior in mind. Well-written documentation and live 
antidote programs are included. Priced for sharing, not for 
making a ridiculous profit. $10.00 (complete) on six 1.44MB, 
3.5" floppy discs. Money orders and checks accepted. No 
live viruses provided! Do NOT ask. Satisfaction guaranteed 
or you have a bad attitude! The Omega Man. 8102 Furness 
Cove, Austin, TX 78753 

sooner or later on your Jerrold DPBB-7 Impulse. Ask 
Manhatten! Soundboard brings the sound back. Best sound 
fix on the market. Easy to install soundboard $24.95. Easy 
to build soundboard schematic, parts list and common chip 
number $34.95. Send us your unit and we will install the 
soundboard for $59.95. SOUNDMAN, 132 North Jardin St., 
Shenandoah, PA 17976. (717)462-1134. 
$19.95 (cash/check/MO) and we will send you a very useful 
list of addresses and phone numbers of banks and financial 
institutions that "WILL* work with you. Most will give you a 
VISA credit card regardless of your credit rating. We even 
include a few banks that will require a deposit, just to "round 
out" the list a bit. For an additional $10 we will include a 
small "how-to" program showing you step-by-step how to 
improve your credit rating and dealing with creditors. You 
might think that your bad credit doesn't mean anything right 
now.. Wait until you need to buy a house or a car, then you'll 
see how much you REALLY need to have GOOD CREDIT. 
So, get back on track. Buy our list and the how-to program 
and start your way back into a good credit status. Cash or 
money order. TCE Information Systems. P.O. Box 5142, 
Los Alamitos, CA 90721 . 

$25 and you will receive your CD and an exact copy. Want 
more than one copy? Send a additional $15 for each 
duplicate. Make checks or money orders Payable to/Mail to: 
Knoggin, 582 Merket Street Suite 616, San Francisco, CA 

AREA? Why not host one yourself? It's easy. Tell us where 
you want it held and give us a contact name and number or 
email address. If you want your free subscription, you'll need 
to provide an address, of course. Think about starting a 
meeting yourself. 

FIND PIRATE SOFTWARE Learn how to find pirate software 
on the Internet. Get thousands of dollar's worth of programs 
for free such as Office97 and more games than you can play. 
Complete guide includes background, tools, techniques, 
locations, and shell scripts that will find software for youl 
Send $5.00 money order or CASH (no checks) to The 
Knoggin Group, P.O. Box 420943, San Fransisco, CA 94121- 
0943, USA. 

RAM DRAM SRAM GALORE We have many hard to find 
memory devices available. If your project requires old RAM 
not available any longer, check us out. We have a very wide 
selection of RAM to choose from. Gl Electronics www. P.O. Box 11029, Westminster, CA 92685 

CB RADIO HACKERS GUIDEI New! Big 150 pages; 
pictorials, diagrams, text. Peaking, tweaking and modifying 
200 AM and SSB CB radios. Improved performance, extra 
capabilities! Which screws to turn, which wires to cut, what 
components to add: Cobra, Courier, GE, Midland, Realistic, 
SBE, Sears, Uniden/President. $18.95 + $4 S&H ($5 
Canada.) NY State residents add $1.96 tax. CRB research, 
Box 56BL, Commack, NY 11725. Visa/MC accepted. Phone 
order M-Tu-Th-F, 10 to 2 Eastern time. (516) 543-9169. 
S-100 BUSS CARDS for sale. I have piles & piles of S-100 
cards I'd like to sell off at $15 each. Vector, Corvus, 
SpaceByte, Cromemco, Heath, etc. Please contact me for a 
complete list of available items, 
AUCTIONS1 You hear about them all the time, but you've 
never been to one? You gotta GO to one. You can buy just 
about anything for pennies on the dollar! Cars, trucks, boats, 
houses, electronic equipment, furniture, etc. Forget that "cars 
for $100" crap. That's a load! But, you can get some pretty 
awesome deals for small amounts of cash.. Our favorite 
auctions (and many of the BL411 staff) include the arcade 
auctions and the car auctions. Remember those arcade 
games you played as a kid in the 80's? Man, you can get 
some bitchen deals on those! This is only the tip of the 
iceberg. There's SO MANY things you can get for a small 
fraction of their worth. Send $5 and we'll send you a booklet 
loaded with names, numbers and places to go.. .You NEED to 
do this! You'll find out how you can attend the non-advertised 
auctions, which will mean better deals for you. Don't miss 
out on all the great deals! So send $5 right NOW: TCE 
Information Systems, P.O. Box 5142, Los Alamitos, CA 

WE WANT WRITERS! That" s right! We want YOU to write 
for us. The people at Blacklisted! 411 are currently seeking 
freelance writers to increase the quality and scope of the 
magazine. We're looking for quality articles related to the 
hacker "scene", events, technology reviews, opinions on 
issues, etc. If you submit an article for print and we use it, 
we'll pay you $25-$600, depending on length, content and 
the use of additional material such as (diagrams, photos, 
pictorials, schematics, etc). We require all photos to be 
3.0megapixel or better. JPG format is acceptable. 
Blacklisted! 411 Magazine, P.O. Box 2506, Cypress, CA 

NULL MODEMS - Download laptop: or upload to your pc the 
easy way! w/ direct connect, or (DOS 6. 1 ) Customized setup, 
no bulky adapters, MAC or IBM compatibles. Send $18.95 for 
6ft cable, specify 25 or 9db ends, custom ok. Instructions 
included. P.O. Box 431 Pleasanton, CA 94566 (510)485- 

NEW BOOK FOR CABLE HACKING. All about the industry 
and how to install test chips in nearly every model of 
decoder. Test chips available, Etc. (408)581-2380 
piece screwdriver bit set is now available for $40 including 
shipping to anywhere in the U.S. The set includes 9 security 
Torx bits from TT7 through TT40, 7 security Hex bits from 
5/64" through 1/4", 4 Scrulox bits from S-0 through S-3, 8 
standard pieces, covered plastic case w/ a nice handle for all 
of the bits. This is an extremely handy toolset you'll wonder 
how you ever did without! TCE Information Systems, P.O. 
Box 5142, Los Alamitos, CA 90721 

you what to do. Where to get parts, everything. Call 24hr.. 1- 
800-295-0953 Only $9.95 + $2.20 S&H Visa/MC/Dis. 
SPEECH CHIPS - WE GOT 'EM Yes, we have hard to find 
speech chips. We have General Instruments SPO250, 
SP0256, Votrax SC-01, Harris HC-55532, Texas Instruments 
TMS5220NL, TMS5220CNL and more. Come and check us 
out We have a wide selection to choose from. Gl 
Electronics P.O. Box 11029, 
Westminster, CA 92685 

HACKERS '95 THE VIDEO by Phon-E & R.F. Bums: See 
what you missed at Defcon III and Summercon 95! Plus, our 
trip to Area 51 and coverage of the "CyberSnare' Secret 
Service BUSTS. Elec Cntr Measures, HERF, crypto, and 
more! Interviews with Eric BlookAxe, Emmanuel, and others. 
VHS 90 min. Only $25 - distributed by Custom Video 908- 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


Our newest selling 60 piece security screwdriver bit set is 
now available for $55 including shipping to anywhere in the 
U.S. The set includes 3 Spline bits M5 through M8, 4 scrulox 
(square) bits SO through S3, 3 torq-set bits 6 through 8, 12 
security torx T-5 through T-40, 13 security hex bits 2mm 
through 5/32 - , 5 tri-wing bits 1 through 5, 3 posidrive bits PZO 
through PZ2, two flat bits 1/8" and 3/16", 3 phillips bits 
through 2, 5 spanner bits 4 through 12, 3 bowtie bits C1 
through C3, triangle bit 2mmx2mmx2mm, wing nut driver, 
1/4" x 60mm bits holder, bit holder socket, socket adaptor, 
ratchet screwdriver and a covered plastic case. This is an 
extremely handy toolset no hacker should be without! TCE 
Information Systems, P.O. Box 5142, Los Alamitos, CA 

SPEECH CHIPS - WE GOT 'EM Yes, we have hard to find 
speech chips. We have General Instruments SPO250, 
SP0256, Votrax SC-01 , Harris HC-55532, Texas Instruments 
TMS5200NL, TMS5220NL, TMS5220CNL and more. Come 
and check us out. We have a wide selection to choose from. 
Gl Electronics P.O. Box 11029, 
Westminster, CA 92685 

instructions on over 300 phones in a software database. 
Also back door and test mode access instructions for all the 
popular models; manufacturer's contacts, system select, lock/ 
unlock info. Just $59.95. Orders only. (800)457-4556, 
inquiries: (714)643-8426. C.G.C. 

WE NEED ARTISTSI We're actively recruiting people to 
submit artwork to us. We're looking for freehand as well as 
computer artwork of technology, people using technology, 
events, devices, utility personnel, utility vehicles in action (or 
doing nothing at all), tradeshows, technology swap meets 
and hacker meets, comics, etc. If it's related in any way, we 
want artwork!! Blacklisted! 411 Magazine, P.O. Box 2506, 
Cypress, CA 90630 www blacklisted41 1 net 
complete range of gambling products designed to cheat 
gambling machines as well as other games. Our products are 
designed to demonstrate to gambling machine owners the 
vulnerabilities of their machines. Our product line consists of 
Gambling Machine Jackpotters, Emptiers, Credit Adding 
Devices, Bill Acceptor Defeats and Black Jack Card Counting 
Devices. Please visit 
ADVERTISE IN BLACKLISTED! 411 Classifieds are now 
FREE for everyone. Reach thousands of readers in the US, 
Canada, Japan, the UK, Australia, and elsewhere. Join our 
long list of satisfied clients who have made Blacklisted! 411 
their vehicle for reaching customers. Blacklisted! 411 
Magazine, P.O. Box 2506, Cypress, CA 90630 www. 

KEYSTROKEGRABBERS.COM Manufacturer of discreet 
keyboard logging hardware. Our devices capture ALL 
keystrokes on a computer including user name and 
password. PARENTS — Monitor your child's internet, e-mail, 
instant messaging and chat room activity. EMPLOYERS— 
Monitor employee computer usage compliance. Employees 
will spend less time browsing the internet and sending e- 
mails if they are being monitored. EXECUTIVES & SYSTEM 
ADMINS— detect any unauthorized access of your PC. If 
someone uses your computer after hours, you will know. 

ADAPTEC SCSI CARDS for sale. We have AHA-2940, 
AHA2940UW, AHA-2944, etc. $20-$30 each. We also have 
brand new 3' and 6' SCSI cables $2-$4 each. DB25-to-SCSI, 
SCSI-to-SCSI II, etc. We also have brand new Belkin 15' 
IEEE printer cables $3 each. Shipping extra. We have a 
wide selection of SCSI products to choose from at low, low 
prices. Gl Electronics P.O. Box 
11029, Westminster, CA 92685 

INTEL SDK-85 SYSTEM DESIGN KITS available here. I've 
been collecting this stuff for years. They're in GREAT 
condition. $100 each plus shipping. If you're interested, 
please contact me ASAP, 

MAKE MONEY NOW, HACKERSI Have an interesting story 
to share? Write for us and make some money. Have some 
cool photo's of something nobody has seen? Send it to us 
and get PAID! Doodle on paper all the time and wish you 
could catch a break.. .along with a paycheck? Draw for us 
and make $$$! Blacklisted! 41 1 Magazine, P.O. Box 2506, 
Cypress, CA 90630 
about publishing or already started publishing a zine, you 
need this resource booklet. Discover who you can distribute 
your zine through and make more money. Send $14.95, 
cash or money order only. TCE Information Systems, P.O. 
Box 5142, Los Alamitos, CA 90721 

a new or used phone from us! Proof of line ownership 
required. We have phones from $129. Call for a list of 
available models, we program many different brands 
including all Motorola, same day service. Orders only. (800) 
457-4556, inquiries to: (714)643-8426. C.G.C. 
WANTED: OLD COMPUTERS for my collection. Looking for 
Commodore, Atari, Amiga computers, accessories, books, 
cables, software. If you have something like this that you no 
longer want, please contact me ASAP. 

NEW BOOK ON HACKING We're going to put together a 
hard cover book full of interesting stories from hackers, 
crackers and phreakers If you have a story to share, please 
send it to us along with some contact information (ie: name, 
address, email, phone number — we won't publish this 
information), your handle/alias/pen-name for print. The 
longer the story, the better. We'd like factual stories, but we'll 
consider fictional stories as well. If you have any suggestions 
on the topic of this book, we'll consider your ideas. Once the 
book is complete, each person who submitted material we 
use will get a FREE copy of the book. Please send your 
material to: Blacklisted! 41 1 Book Project, P.O. Box 2506, 
Cypress, CA 90630. 

to find parts for your arcade games. We have custom ROMs, 
PROMs, custom sound and speech chips (AY-3-8910, AY-3- 
8912, AY-3-8913, HC-55532, TMS5200, TMS5220, SC-01, 
SPO250, SP0256, LM379, etc), custom video chips 
(TMS9928), custom Atari chips (AVG, SLAG, SLAPSTIC, 
POKEY, etc), custom Namco chips, custom Williams "Special 
Chip 1", D-to-A and A-to-D converter chips (AD561JD, 
AM6012, AD7533, ADC0804, ADC0809, etc), Atari LED 
buttons, Keltron brand Cinematronics flyback transformers, 
trackball roller repair kits, 6500, 6800 and Z80 series CPU's 
and support chips. We even carry manuals and schematics. 
We have a wide selection of arcade parts to choose from. Gl 
Electronics P.O. Box 11029, 
Westminster, CA 92685 

ever looked online for some collectable components or 
vintage electronic equipment, only to find out that it's cost is 
way too high? This sourcebook will provide you with the 
ability to locate the same items at only a small fraction of the 
bloated online cost. Buy collectable gold chips (Intel, 
Motorola, Zilog, National Semiconductor, etc) for $20-$40/lb. 
Do you have any idea how many chips are in a single pound? 
More than enough to make this sourcebook worth a peek! 
Find that Intel C4004 you've been looking for and pay 
pennies, not hundreds of dollars. Grab a few thousand 
EPROMs and pay a few bucks a pound, not a few bucks per 
EPROMI! Find older high end EPROM programmers for $20- 
$30, not $200-$300! The deals are many, the price is 
minimal. You'll be glad you got yourself a copy of this 
sourcebook and wonder how you ever did without! Send 
$19.95, cash or money order only. TCE Information 
Systems, P.O. Box 5142, Los Alamitos, CA 90721 
replica 1 is a functional clone of the first Apple computer. 
Prices start at $129. See for more 

Marketplace classified advertising is currently FREE to anyone. It's a first come, first served offer, limited only by 
space constraints within each Issue. If you'd like an ad placed within Blacklisted! 411, you should send it in as 
soon as possible. We accept both commercial as well as personal ads. We may decide not to publish any ads 
which are Inappropriate or have no connection with the hacker community. 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

The Social Engineer 

Thoughts/ stories and a perspective from someone experienced 
in the relatively unknown art of social engineering . 

I'm sure if you read Blacklisted! 411, you've heard the term, "Social Engineering" or possibly even know someone very 
capable in the art. Because the readers of this fine magazine are most likely in the know, I won't bother going into detail 
trying to describe what a social engineer is or how to become one. I'm going to write about some of my experiences and 
thoughts on the subject. We'll leave it at that. I hope you enjoy the article, folks. 

I've been a social engineer most of my life. Early on, I had no idea and I don't believe there was even a term for it at the 
time. What I did know was that I could get just about any piece of information I wanted out of anyone I approached or dealt 
with - both in person, over the phone, on BBS's and the internet when it became the new and popular method of 
communication. No matter what it was, I seemed to have a knack at getting the exact information I wanted. I always 
considered myself a gifted "talker" and didn't think about it much beyond that. 

When the 80s rolled around, the term started to take hold and I realized I was in fact a Social Engineer. I suppose it was 
cool to know there was a following which dealt with the subject, but I didn't flaunt the fact that I was good at pulling 
information from people. In fact, I kept that piece of information it to myself only until very recently. Today, it's not such a big 
deal anymore because social engineering seems to be a standard trait among most hackers and technical oriented people 

I've noticed, however, that many of the social engineers of today rely much too heavily on trash digging and gaining access 
to information by means of forced entry. There's much more subtle and direct ways to get the information sought after 
without using questionable tactics to do so. While trash digging and forced entry may result in getting the information you 
want, going to directly to the source of the information will bring in positive results time and time again if you know what 
you're doing. I can't stress enough that direct contact is the best way to get the information you seek. 

Most people, even today, are generally "easy" and quite susceptible to persuasive measures in a carefully calculated social 
engineering conversation. Many people supposedly experts on the subject will tell you that certain "types" of people are 
incapable of being worked for information, like cops, "smart" people (notice f didn't say "smart cops"), or technically gifted 
people. Contrary to this belief, this is unquestionably not true. The fact of that matter is that anyone can be worked for 
information given the proper circumstances and the level of talent of the social engineer. 

In my decades of social engineering activities, I've found the following methods to work best: 

• In dealing with a computer user or technically gifted person, obviously use the subject of technology as an easy "In" to 
get the manufactured conversation going. Once going, appeal to their specific interest(s). This works out really well most of 
the time. You have to get in "tight" with these guys. Nine times out of ten, you'll get what you want fairly quick. 

• In dealing with a cop or other authority figure, do not take an aggressive position. This will almost always work against 

Don't know what you're doing? 
It pays to read 

Blacklisted! 411 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


you. Instead, take what appears to be a "submissive" position and be friendly to them. Further, acting "stupid' will get you 
•everywhere* with these people. Before you know it, they're telling you everything you want to know and they won't realize 
you're working them. Surprisingly, this method works so well, I've used it quite a bit. If you can get over the way it makes 
you "look", playing stupid is such a perfect method of social engineering. Also, in addition to this, many times cops will 
"respect" someone who appears to be very smart, particularly when it comes to technology/computers, as long as this person 
doesn't also appear aggressive in any way. Most of the time, they'll want you to help them find software or fix their 
computer - they rely on help from this type of person. It's an easy "in" for you. 

• In dealing with your every day drone (ie: not technically gifted, not really smart), take a position of authority. If you 
appear to know what you're doing or know what you're talking about, these people will submit nearly every time without so 
much as a single opposition to your apparent authority. This works especially well if they can't "see" you (ie: on the phone) or 
if you wear suit/tie and look like someone "above" them. They usually won't question you, and if they do, it will be a very 
weak questioning you can get around. Just be bossy! 

• In dealing with pushy or stubborn people you may have to use any one or more of several methods. These people are 
what I consider to be the wildcards as they don't tend to fit into any single method of attack. Sometimes pushing back works, 
sometimes playing the role of an authoritative figure will work. What I try to do with these people is start easy, ask them for 
their full name, extension, department and supervisors name. If they get snippy, I push back real hard and go directly into 
authoritative role. I work on them for a minute or two this way and then back up to friendly role. This usually does the trick. 
What you're doing is putting them on the defensive, making them realize maybe you're someone important and then they 
start thinking about losing their job or freedom in some way. Once you switch back to being friendly, suddenly they have 
"out" which comforts the crap out of them. Suddenly, you're in a position to get information. 

These are the four basic personality types I have dealt with and the methods I've used to get results. Naturally, your mileage 
will vary greatly on your skills. I've found that your physical size, power of your voice, your knowledge of the subject matter 
and they way you groom yourself will greatly affect what you can and cannot do when it comes to social engineering. For 
instance, if you're BIG, playing the role of authority works great. If you're small, playing the role of "submissive" works fine. If 
you have a loud voice, but your small, you can play authority role on the phone. If you're big but have a soft voice, you can 
play the submissive, stupid or friendly roles with ease. Naturally, it's easy to figure out what roles you'll be best at. With 
practice, you can be excellent at each and every role, learning to control your voice and change your attire according to the 
situation at hand, etc. 

Now, I'll briefly mention a couple of the more interesting experiences I've had. 

No kidding, I once played the role of a "secret agent" (authority figure) when I was younger (ok, I had a deep voice) and was 
able to get an individual to give up a login and password for a BBS he frequented. It took all of 2 minutes, a conference 
phone and a really pushy attitude. I had effectively scared the information out of him. Later, I discovered the guy had pulled 
all of his computer equipment apart and hid it away. Heh, that was very funny at the time. 

One time a buddy of mine was starting up a new business to compete with a sleazy company which had screwed him over in 
a business deal earlier that year. He needed some information on the vendors and customers the company was dealing with 
so he could move in on them, offering superior product and support. He unsuccessfully attempted to gain this information 
several times. I was asked to help out in the situation. I agreed because it seemed harmless enough. So, I scoped out this 
company for a day to figure out who was who and the movement of the workers. I then went into the establishment and 
immediately started grilling the secretary running the front office (playing authority figure, never even identifying myself). With 
a small notepad in hand, I asked her for her name (first, middle, last), her bosses name, the names of the people in the 
warehouse, etc. I scribbled on the notepad as she spoke. She started to ask me, "what's this all about" and I ignored her, 
cutting her off asking more questions - how long have you worked here, are they mistreating you in any way (surprisingly, she 
said YES!), then I asked her several questions on how she was mistreated and if "she was the one who contacted the 
authorities". Suddenly, the floodgate opened up for me. She told me no, but she immediately opened up to me - this is when 
I hit her with the real questions. I asked her for information on vendors and customer information and told her that if she 
cooperated, she would not be prosecuted. After only 8 minutes of direct contact and I had a complete list in hand. I even 
told her "thank you." 

Obviously, the authority role has always worked well for me. However, I should mention that every other role has worked 
well, too. I guess I can look pretty stupid when I play the stupid role. :-) 

Again, I'm a big believer that all information can be gained from your target, using legal yet persuasive methods. I've never 
had to dig in the trash and I've never had to break into an office or a desk to get information I wanted. If you stick with it and 
work on your methods, you will become a skilled social engineer., capable of getting information on demand. It's really a very 
useful tool in today's world. Social engineering is an incredible asset. 

Want to advertise to a target 

audienee of computer and 

electronic enthusiasts? 



It's inexpensive and a great way to 

advertise to people with the "right 

stuff." Contact us for details. 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 





< Z80 























































681 OP 














































































Z6530 SCC 






















# 6£ 








































































































271 28A 









AY -3-891 2 


















i PR 

OM i 











































































































, CA 92685 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 



finding parts and support for these aging computers 
By Wild E. Coyote 

Ok, so it's been almost two decades since the introduction of the Amiga line-up and you're still holding onto your aging 
collection of once leading edge computer equipment in hopes there will be a resurgence of the long since disbanded group of 
Amiga enthusiast Well, perhaps that's not entirely fair. There are still a very large number of people who are pro-Amiga and 
hold onto their equipment and actively support their computers. However, many of the original of the Amiga enthusiasts are 
no longer active, which makes the task of finding others with the same interest somewhat difficult. Lucky for everyone, the 
Blacklisted! 411 crew and an undetermined number of people on the internet still hold a place in their hearts for the Amiga 
computers and don't mind admitting it. We'll try to direct Amiga lovers to others with a similar interest. 

Will the Amiga ever be at the level it was before the crash of Commodore? Possibly, but not without the passage of time and 
a lot of effort. But that's not to say there won't be some exciting equipment to be produced in the near future which is based 
on the initial Amiga design in some way. For instance, the Amiga One is now available to Amiga lovers and offers many new 
features and advanced architecture. It's sure a hot topic and is the best thing to happen to Amiga in a long time. 

So, here's our small listing of Amiga resources. If you'd like to have a resource listed in an upcoming issue, please contact 
us either by mail or through our website at http://www.blacklisted41 1 .net 


AmigaOS - 

Run by the current owner of Amiga, this site is worth the look if you're into the Amiga. There is a forum section complete with 
recent postings and new topics. The Amiga One forum is actually quite busy with traffic. There is even a dealer section 
where they list Amiga dealers. That's sort of cool. 


Amiga Forever - 

Official site of the Amiga Forever emulation software - for those who want to run workbench on a Windows machine. 
Currently, version 5.3 is available. It's actually nice for a PC Windows software. If we can't keep people with the Amiga 
through the hardware, maybe we can keep them through software. 

EyeTech - 

Interested in the new Amiga One, check this site out. There's plenty of information on the Amiga One as well as older Amiga 
computers and accessories. They list all the dealers who carry the Amiga One at 
Check them out, they're worth the visit. 

Software Hut - 

A mail order Amiga dealer from the old days which is still in business. They have new, used and everything in between. 
We've bought from them many times and think they have a good thing going. 



A great resource for emulators, games, demos, applications, music, etc. They've been around awhile and they've become a 
wonderful place to visit. Check them out. - 

A great resource complete with a forums section, images, advertisements, etc. It's an interesting site worth the look, so if you 
have the time, visit! 

Amiga Forums - 

This is another Amiga forum site run on phpBB. I personally think that the forum sites are some of the best resources 
available right now. It can put you in touch with a lot of other people with similar interests. Anyhow, this forum site is current 
with a lot of activity. Again, worth the look. 

Amiga Source - 

Excellent site filled with links to over 1400 Amiga related sites spanning over 41 categories. You'll find this site to be worth 
the look in that you'll find MANY other Amiga resources. 

Total Amiga - 

A real honest to goodness Amiga PRINT magazine. One of the last, if not the last print magazine for the Amiga. This 
magazine used to be called "Clubbed" but they changed the name with issue 10. They're now to issue 17 which was just 
printed as of 02/19/04. Go and get a subscription. 

40 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

Hacker/ Phreaker BBS Stings 

By Gary D. Robson for Blacklisted! 411 

Law enforcement has a mixed response to hacking. Most agencies don't understand what it is, and don't know the difference between an 
old-school hacker, a white-hat hacker, a cracker, a phreaker, or a virus author. The laws are often ambiguous, and prosecution is 
dependant on who, exactly, is hurt— or thinks they are. 

Internet-based stings are getting fairly common. There are regular courses taught in the development of "honey pots* 1 on corporate 
networks, and whole books about catching invaders in computer systems. 

There are a lot of ways to set up a sting. Read Cliff StolPs book, The Cuckoo 's Egg. The whole book describes one large hunt for a digital 
invader (Hans Huebner, a.k.a. Pengo), including an elaborate sting where he created a fictitious government project as bait. 

When Janaka Jayawardene was trying to track down the cracker that had invaded his systems at Portland State University (a minor, using 
the name Phantom Dialer), he used a classic cracker technique - the Trojan horse. He modified the telnet program to keep a keystroke log 
so that he'd be able to see everything that Phantom Dialer did when using telnet from the Portland State University computers. The tale of 
Phantom Dialer is told in the book, @ Large: The Strange Case of the World's Biggest Internet Invasion. 

These operations, fascinating for the way they pitted hacker against cracker, don't fit the classic law enforcement definition of a sting, 
though, because they had a very specific target right from the beginning. A more classic sting was the Phreaker's Phortress. 

The Revenger and the Phreaker's Phortress 

In 1985, most police officers had never used a computer, and had no idea what a modem was. Sgt. Dan Pasquale of the Fremont Police 
was an exception. 

Fremont, California is big enough to be called a city, but small enough to feel like a town. There are no high-rise office buildings, 
subways, and other trappings of big-city life. The police headquarters building overlooks a big lake in Central Park, and has a view of the 
mountains at the edge of town. With 100 square miles of land, Fremont has plenty of space to spread out, and it does. 

Fremont, however, is no stranger to technology. It is at the edge of Silicon Valley, a few miles from San Jose. It was inevitable that 
technophiles would find their way onto the Fremont Police Department, and Pasquale was one of the first. 

He had a Commodore 64 at home, just for fun, and the thought of combining his job in law enforcement with his computer hobby didn't 
occur to him until he arrested a juvenile for shoplifting. The kid was carrying a stack of credit card receipts he had pulled from a 
dumpster, and Pasquale asked him what he intended to do with them. As they say in the gangster movies, the kid sang like a canary: He 
was part of a group that traded and/or sold credit card numbers. 

Pasquale was fascinated by the whole computer underground and the BBSs that were popping up all over the country. He asked his 
superiors at Fremont PD for approval to set up one of the country's first sting BBSs, and was told mat the department would authorize a 
couple of hours a week of his time, but wouldn't cover all the expenses of setting up and operating the BBS. 

There was no problem finding Silicon Valley companies that were concerned with computer fraud and cracking at the time, and Pasquale 
went hunting for support. Apple Computer donated an Apple Ue computer with an external 40 megabyte disk drive (that was a lot of disk 
space in 1985) and a 1200 baud modem. Since his primary targets were people stealing credit card numbers and long-distance calling 
cards, he also got support from the credit card companies and phone companies. 



If you have a photo of a payphone, local telephone company vehicle or building, local cable 
company vehicle or building, interior of a telecomm. or other utility building, inside a 
manhole, inside a utility box or some other interesting item, please send them to us along 
with a short "memo" explaining what it is that we're looking atl 

If you send a photo that we end up using in our magazine, we'll mention your name along 
with the photo. 

Send to: 
Blacklisted! 411 Photograph Submissions, P.O. Box 2506, Cypress, CA 90630 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 

Visa, MasterCard, and Wells Fargo Bank all created credit cards just for Pasquale's sting. The cards had $500 limits, and the verification 
systems were set up to track them. AT&T, Sprint, and MCI donated calling card numbers with similar tracking. 

The local phone company, Pacific Bell, agreed to install a telephone line into police headquarters that was shown on all the records as 
being in a nearby apartment complex. Pasquale said that the only way of actually tracing it to the police would have been to crack the 9 1 1 
system - that was one thing Pacific Bell would not agree to mess with. All other verifications, including cracking the switches and social- 
engineering operators, would have led to the false front in the apartment 

With the infrastructure coming together, the next thing Pasquale needed to do was go undercover himself. He adopted the handle "Speedy 
Da Mouse" (for his favorite cartoon character, Speedy Gonzales), and started joining all the underground BBSs he could find. 

Sysops of cracking/phreaking boards were justifiably paranoid, and most required verification of a new user's true identity. Often, this 
involved a telephone conversation. Pasquale said, "Even then, I didn't sound like a 17-year-old, so I needed another way to buy into their 
confidence." That way was card numbers. 

On virtually every board he contacted, giving them a valid credit card number or long-distance calling card number was all the ED he 
needed. Speedy began developing an identity. 

Even as Speedy Da Mouse infiltrated BBSs across the country, Pasquale was putting the finishing touches on his sting BBS. The Apple 
lie went into a broom closet at police headquarters, and Pasquale created a main board with five sub-boards. Most of the maintenance 
could be done from his Commodore 64 at home, so he didn't actually have to climb in the crowded closet with the Apple very often, 

The BBS took shape. He built sub-boards specifically for stolen credit cards, phreaking, and cracking. In September of 1985, Phreaker's 
Phortress went online. 

The sysop of Phreaker's Phortress was another Pasquale identity: The Revenger. Speedy Da Mouse posted messages on every BBS he 
knew of, announcing this cool new board in California, and vouching for The Revenger. 

I asked Pasquale what made the Phreaker's Phortress look real. "It was real," he replied. Sure, there were users who suspected this 
unknown Revenger guy of being a cop, but their suspicions went away when he handed out bait. 

Throughout the remainder of 19S5 and into early 1986, Pasquale gathered evidence and continued to learn about his BBS and the 
computer underground. He found, for example, that as he was monitoring the BBS one day, someone pressed the Z key 36 times, and was 
immediately given full access to the board. He contacted the company that had written the BBS software, and they sheepishly admitted 
that they had written this back door into the program to allow them to check on installations and see if they were legitimate, and to help 
sysops that locked themselves out of their own BBSs. 

In late March, Pasquale went full-time. For two weeks, he got his warrants, and built up to the arrests in April. Seven of the targets were 
locals, two were out-of-towners who lived elsewhere in California, and another half-dozen were from other states. He rounded up the 
seven locals and turned the others over to appropriate agencies. To the best of his knowledge, the Feds never even followed up on the 
ones from out of state. 

The seven locals all turned out to be juveniles. He had them red-handed, not just for computer intrusions and theft of long-distance 
service, which the courts didn't understand, but also for having and using stolen credit cards. All seven pled guilty to possession of stolen 
property. They had their equipment seized, and they cost their parents a bundle in legal fees and fines. 

Since they were minors, their court records were sealed when they turned 18. Their names were never disclosed to the press. I asked 
Pasquale if he had kept in touch with any of them. He told me that one had become a nuclear engineer and joined the military. As of a 
couple of years ago, he was serving on a nuclear submarine. 

When Pasquale took down Phreaker's Phortress, the credit card companies and long-distance companies shut off their bait cards. "Were 
they out a lot of money?", I asked Pasquale. Actually, he told me, they went after the parents of the kids for reimbursement of everything 
they charged on the cards. In some cases, however, it was merchants that got stuck. 

Visa and MasterCard have very strict rules about verifying purchases. These days, your card is run through a reader that dials up a 
verification service. In 1985, merchants were supposed to call themselves to check out purchases over a certain limit. In one case, one of 
the credit card thieves had purchased $3,000 worth of computer equipment, and the store never bothered to check the card, which only 
had a $500 limit. Because they broke the rules by not verifying the card, the store was stuck for the money. Their only choices were to 
write it off or sue the parents of the kid that bought the equipment. 

As you can see, even though die criminal investigation may only net probation and confiscation of computer equipment, the civil lawsuits 
can drag on for years and cost thousands of dollars in legal fees and eventual settlements. 

Could a sting like Phreaker's Phortress happen again today? You bet it could. Pasquale doubts that a BBS sting would be worth it 
anymore, because everyone has moved on to the Web. There are still BBSs, although most of them are accessible through the Internet 
rather than dial-up, but nothing like the hundreds of underground boards that existed in the 80's. 

Today, Pasquale said, a sting like that would be done with a Web site. I asked Alameda County (California) Assistant District Attorney 
Don Ingraham if a similar Web sting had ever been done. Yes, he said, it has. 

The Legality of a Sting 

There's nothing new about stings. Law enforcement has used them for decades. Ingraham explained that the only things police need to 
watch out for is entrapment. Pasquale set up a BBS and allowed people to talk about what they were doing. They freely shared stolen card 
numbers and bragged about their cracking and phreaking exploits. They did it on a system that he had the right to monitor. 

"You can't seduce innocent people," Ingraham said. If you talk someone into committing a crime that they wouldn't have otherwise 
committed, that's entrapment. If you give them an environment where they can discuss the crimes without actually encouraging them to 
commit crimes, you have a legal sting. 

42 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

It's hard to argue that stealing credit cards is moral or ethical. It's theft. Often, however, crackers present arguments that breaking into 
systems is a benefit to society. Ingraham appeared on TV's Geraldo show with Craig Neidorf— -the famed Night Lightning. Neidorf made 
precisely that argument, explaining that by finding security holes and pointing them out, he was improving security and making the 
systems better. Geraldo asked Ingraham whether he considered Neidorf s cracking (Geraldo, of course, called it "hacking") a public 

"Right," responded Ingraham, "and just like the people who rape a co-ed on campus are exposing the flaws in our nation's higher 
education security. It's absolute nonsense. They are doing nothing more than showing off to each other, and satisfying their own appetite 
to know something that is not theirs to know." 

Neidorf and Ingraham represent two ends of the spectrum, and most of us are in the middle somewhere. If you break into your brother's 
computer as a gag, most people would not consider that to be a crime. If you break into Bank of America's central computer and transfer 
a few million dollars to your own account, it's pretty obvious that's a Federal crime. 

I asked Ingraham whether he still agrees with what he said on Geraldo over ten years ago. "Absolutely," he responded. He explained that 
he wasn't actually equating the severity of breaking into a computer with committing a rape, but that he felt the comparison of logic was 
perfectly valid. 

We also discussed Ingraham's opinion of Neidorf s case. As you may recall, Neidorf was the co-editor of Phrack who was arrested for 
publishing a document stolen from BellSouth- The document was lifted by a member of the Legion of Doom, who went by the handle of 
Prophet. He copied the document from BellSouth's computer as a trophy, to show that he had actually been there. It passed through 
several hands, and finally made its way to Neidorf, who edited it down and printed it in Phrack. 

The document, which became known as the "E911 document," was a description of the BellSouth Extended 911 service. Not the 
equipment-the service. There was virtually no useful information about the computers at all. BellSouth claimed the document to have a 
value of $70,000, which made the theft and possession major felony offenses. It was only after the E911 document was found in a 
directory of products offered by BellSouth, and court shown that anyone who wanted it could get it for $13, that the trial began to fall 

Ingraham, who was responsible for overhauling some of California's search and seizure laws, felt that Craig Neidorf was a nice guy that 
was taken down by a very bad warrant. Unlike many prosecutors, Ingraham is no stranger to the world of hacking, cracking, and 
phreaking. He subscribes to 2600, and regularly reads Phrack and Blacklisted! 411. He believes that publications like this are covered by 
the First Amendment, and that they contain useful information as well. 

It's unfortunate for Neidorf that he was in Chicago rather than Alameda County, California. It sounds like he would have fared much 

What Should You Do About Stings? 

If you're not doing anything illegal, a sting board (or Web site) shouldn't be anything for you to worry about. Unfortunately, that's not 
always the way it works. 

The laws in this country are based upon the assumption that individuals are innocent unless they are proven guilty. It is likely, however, 
that if you get involved in a board where criminal activities are being discussed, you will end up being investigated. Even if you are never 
charged with a crime, it could cost you money for legal fees and a great deal of potential hassle if your equipment is impounded. 

Your best bet is to stay clear, or just lurk. You just never know who's on the other end of the networi v 

You're a technophile looking for a convention, 
We're a convention looking for tech noph lies. 
It's funny how that works oyt, isn't if? 



On June 12th and 13th of 2004, we wiK be holding the first . jsion of LayerOne in Los 
Angeles. We've got some great ^puakors tai^u u,>s>i < -like: 

- ZeroHnstali cryptographic mail systems 

- Flawj T. rtittent social '«>'..»' '•• systems 

• Problems behind treating security desi; ;n as an aSterthou sh! 
We hope that these talks will not only be interesting but also thought provoking by 
covering topics you don't really see at a regular isrtcker c mventiws Then again we're not 
trying to be "another hacker convention". So if you'd like to wrap your brain around 
something other than drinking games we may be tor you. For more information, please 
check out our website at http-i%ysrorie.irifo/ 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 




The talent of digging up valuable items from a heap of garbage 


By Trash-OOX 

m . mm 

You may have heard the term "dumpster diving" a few times and wondered to yourself what it's all about. It's easy to imagine 
it as a sport of some kind where someone jumps off a roof into a dumpster. I mean, there have been much more crazy 
"sports" out there, so why not? Maybe, but that's not what it is. In fact, dumpster diving isn't realty a sport but rather a way of 
living. In a nutshell, dumpster diving is nothing more than the act of digging through the trash. I'm sure you know what a 
"trash digger" is, right? Dumpster diving is what a trash digger does, most likely to make a living or to obtain something with 
perceived value for no cost at all. 

According to the dictionary jargon file, Dumpster Diving is defined as: 

"The practice of raiding the dumpsters behind buildings where producers and/or consumers of high-tech equipment are 
located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in 
some hacker's den. Experienced dumpster-divers not infrequently accumulate basements full of moldering (but still potentially 
useful) cruft." 

Ok, but digging in the trash to make a living?! What, are dumpster divers bums or something? Not really. While you'll find 
your average bum, hobo, transient etc digging in the garbage for food, clothing or cans to recycle, this isn't the same breed 
of people we're going to talk about in this article. We're going to focus on the people who seem normal (ie: have a job, 
money, a home and most like a family as well) and find it worth-while to hop into the trash.... for some reason. 

Face it, a lot of people find value in other 
people's refuse. One person may believe 
something to have no value while another 
believes differently This concept is what 
has made the idea of dumpster diving 
become so popular. In fact, it's such a 
popular subject, that there are websites 
devoted to the topic. Now, that's pretty 

Ok, so let's get on with the article. 

One day, you might come along a dumpster 
such as the one pictured to the right. "Yeah, 
so what?" you may think to yourself. It may 
seem just like any other dumpster, but what 
makes this one so different from your run of 
the mill dumpster is the fact that there's 
some hidden value in this otherwise plain 
looking garbage. The lay person would 
never notice this, so don't feel bad. 

The experienced dumpster diver would 

immediately recognize the obvious 

electronic equipment sitting on the top of the heap as being somewhat valuable. This would normally be enough to persuade 

further investigation (ie: digging a little deeper). Upon a detailed inspection of the contents of this dumpster, the number of 

valuable items obtained was large. The final results were quite staggering and a real eye opener. 

Gathered up were about two dozen pieces of equipment 
total. A quick look on ebay proved to get an initial valuation 
of the equipment at roughly $200. The items were cleaned 
up, tested, and listed on ebay (some listed "as-is" because 
they did not function). I know, most people who read 
Blacklisted! 411 probably don't like to use ebay, but for the 
purpose of demonstrating "value" for the sake of a timely 
completion of this article, I decided to offload the items in this 
fashion to get quick results. So, the final tally once 
everything sold on ebay (everything was listed 3-day with no 
reserve) was over $700! To be honest, I was surprised by 
the total income from the material. Everyone paid and the 
items were sent out. Done deal. 

The point is, the garbage found in this one specific example 
generated over $700 on the open market. Dumpster diving 
truly is a way to make some money, either on the side or for 
a full time living if you can handle it. Yes, these are ebay 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

prices, but it's only one example of how this kind of find can be later sold to generate some decent money. 

where should i look? _______________■____§ ii____Bl_______ 

Where can you find scores such as the one described in this jH 
article? All over the place! However, I'll try to help guide you a j^fl 
little bit so you can find your own treasure trash. W^'^SK 

Mainly, you will find these kind of dumpsters (the ones filled with Ik jS 

cool junk) behind industrial business centers. You'll also find vIl _E 

them being manufacturers of electronics and computers, but ' | fc| >L ^^T^ 

their trash tends to be locked up and inaccessible. One of the f ^^W |JJ |^^^ 

most overlooked places are the dumpsters behind THRIFT j^^yffiW 

STORES - they toss a lot of stuff they don't think they can sell j|_ffcZ^_*MpP^B 

(you can find a lot of old computers and game consoles here). ■ 

You can also check electronic/computer store dumpsters, I PUk ^^^HSr^^^S 

bookstore dumpsters and video rental dumpsters. They all ■ Wf^ ;i|y ,^#^oiiM 

usually have something worth grabbing. If you're not sure, look H Hfe ' **-. Jf* 

in the local phone book for places such as the above and get H ^K jfl 

their address. Go there and take a peek in their trash. It cant H HaW.: :: ■■■ ^o^mmm^mKmtBKmWtk 



Some cities and counties have laws against digging in the trash, so your best bet would be to ask the people/company who 
dumped the trash if you can have it. If they agree, there's no issue of possibly breaking the law to deal with. If they say NO 
and you dig anyway, there's a good chance you'll get in trouble. You can take your chances, but remember, ignorance is no 
excuse for breaking the law. Be careful and check with your local city ordinances on the subject. Don't trespass and don't 
steal. Follow this and you should be fine. 


Use some common sense and clean up any mess you may make during the process of a dumpster dive. In fact, even if you 
don't make a mess and there happens to be a mess near the dumpster you're diving into, clean it up anyway to avoid being 
blamed for it. Naturally, if you have to dig deep, you're going to end up making a mess. Clean it up when you're donel If 
anything, this will help to ensure the dumpster will not be fenced in at a later date. If there's a fence surrounding the 
dumpster, don't climb over it. The fence was put there for a reason, so respect it's limit.. If you hurt yourself during a 
dumpster dive, don't sue the owner of the trashcan since you went out of your way to get into the dumpster in the first place. 
Oh, and don't take the name "dumpster diving" literally - in other words, don't actually "dive" into the dumpster! Climb in, 


A vehicle is usually a good start, but you should at the very least have a bag or a box to contain any findings you may come 
across. Be sure you wear long pants and avoid wearing shorts. Bring some gloves as well. Further, you may wish to bring a 
bottle of water (or a key for a water faucet - a lot of business centers have faucets with no key on them) so you can wash 
your hands and a bottle of hand sanitizer. Try not to dress like a ninja (in all black) and dumpster dive at night - it looks too 
conspicuous and people will make complaint calls to the police. Bad idea. 


It's fairly easy to assume you will be able to locate any of the following if you look enough: 

Computers, televisions, stereos, VCR's, DVD players, CD players, telephones, answering machines, electronic components, 
wire, test equipment, magazines, books, software, furniture, and many other items of value. 

What's somewhat interesting is that a lot of the electronic/computer "reclamation" centers around today started with a guy 
digging in the trash. No, seriously! I can name at least three VERY well known places in the area which started this way. 
There's still plenty of room for this cash-cow to spit out money for new people getting started. 

In closing, all I have to say is ENJOY YOUR DUMPSTER DIVING!! 


Blacklisted! 41 1 Volume 6 Issue 3 - Summer 2004 45 



By TechnoHeap 

Greetings fellow collector. This is the third installment of an ongoing article on the subject of locations where one can find awesome 
deals od components, equipment and parts. 

I have been collecting, buying and reselling integrated circuits (otherwise known as "chips"), electronic parts and equipment since the 
early 1980's. In the time that I have been doing this, I have grown to know first hand many sources who deal in LESS THAN 
WHOLESALE priced chips, computer equipment, electronic equipment and parts. That's right, these items are available for pennies on 
the dollar and this is literally, not figuratively speaking. Some of the things you will be able to find at rock bottom prices: Intel, AMD, 
NEC and DEC gold chips, Macintosh computer equipment, EPROMs, EPROM programming equipment, vintage computers, chips, parts, 
newer equipment, computer parts, brand new excess inventory chips.. .the list goes on and on 

Have you ever wondered about those $300 - $400 Intel C4004 chips for sale on ebay and wonder to yourself how much you could get 
them for if you knew the sellers source? How does $40 per POUND sound to you? It takes quite a few of these chips to add up to a 
pound, so you can see the potential. The going rate for "gold" chips is in the range of $20-$45 per pound and you can buy this stuff all 
day long at those prices... IF you know where. The sources I will reveal generally don't care what the chips are, only their bulk value. 
This is where a person with the right knowledge can make a killing regarding resale of the same items. 

I've seen these sources come and go by the dozens over the years. What few of these sources remain have been a very well kept secret 
among the few in the know and to my knowledge, nobody has ever revealed these sources in an all in one information article before. 
What is about to be revealed to you isn't "fluff" like a lot of other informational articles or those "e-books" provide, you know the ones 
that claim they're going to reveal wholesale sources to you and you end up finding out ifs just a bunch of useless, and I use this term 
loosely, information. Anyhow, the information I will provide you with is specific hardcore rock bottom priced sources which other 
people use to obtain the parts they resell - even EBAY sellers) You can use this information right now and make money immediately! 
Furthermore, it won't break your wallet to stock up on some parts for immediate resale.. ..or collecting. 

I'm officially out of the chip/equipment collecting/buying/selling business and since this highly secretive information no longer serves my 
needs, I'm going to spill the beans once and for all which will allow a whole new generation of collectors and entrepreneurs to access the 
massive opportunities us old-timers have had all to ourselves for decades. Are you ready? Be sure to check out each and every single one 
of these places and BUY, BUY, BUY as much as you can - stock up and resell until you're blue in the face. Dont forget where you got 
this information, either -- a simple letter to Blacklisted! 411 telling them about the great deals you've found for yourself will do. I'm 
going to be listing salvage yards, obscure retail locations and swapmeet sources. These are all worth the time to visit and explore. 

Ok, on with the list.... 

ECSC (Electronics and Computers Surplus City) 

P.O. BOX 3148 


TEL (800)543-0540 

TEL (310)217-8021 

FAX (310)217-0950 



Type: Salvage/Surplus/Excess Inventory 
Contact: Barry Gott 

This place used to be my most favorite salvage yard to visit. In fact, I visited this place for over a decade, finding awesome deals every 
single time I dropped in on them. They've shut down the yard, but they show up at all of the electronics swapmeets every month. You'll 
find them at ACP and TRW. They still have a lot of interesting items for sale. If you check out their website, you'll find all sorts of 
interesting items for decent prices. The real meat of this particular mention is BARRY (yes, a person). He's the owner/operator of ECSC 
and he's one heck of a cool guy to know. He knows everyone in the business and everything about every company in the business. He's 
what I like to refer to as the grandfather of electronic surplus. He's been around since the beginning and he's watched all the big guys start 
from scratch. If you want to know where to find something (and if he doesn't have it), he'll tell you where to find it. 

Let me give you some history on this outfit. They used to run a BIG (and I mean, HUGE) salvage yard in Gardena, CA off of Artesia. A 
picture of the old yard is on their website - boy, it brings back the memories, (sob, sob). Everytime I went to this place, they had junk 
(and 1 mean, the good stuff kinda junk) piled 10 to 20ft high everywhere... and this was outside of the building. Inside was an incredible 
selection, much like a well stocked electronic store, but way better. They had it all. Chips, caps, resistors, meters, motors, diodes, 
rectifiers, transformers, connectors, wire, switches. Man, they had it all and then some! And none of this was scrap - it was all excess 
(usually NEW) inventory at rock bottom prices! What the best part was that if you brought out a big load of let's say $25,000 retail value 
worth of parts, waited to talk to BARRY and get a price from him, you'd walk out with the entire load for maybe $200-$300 at most. It 
was too easy to spend money here. I still have parts coming out of my ears from this place which I'll probably never use, but who cares. 
A deal is a deal and this place had the deals like no other. 

Back to the yard with the 20ft high loads of junk. I spent a lot of time digging around in the yard. I found all sorts of interesting scrap 
items that I was always able to turn into profit. I suppose it was more of a field trip for me than anything else but there were some 
treasures to be found in those piles. I found them, too. 

46 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

Anyhow, sometime down the road, they either left the building they had or got the boot out of the bulding, I was never too sure on this 
one. Either way, they still showed up at the swapmeets every month, so I still bought some stuff here and there, but not like when they 
had the scrap yard. Whenever I hit up the swapmeets, 1 always make it a point to talk to Barry. He's worth every second of time I've ever 
spent with him. So, next time you're at ACP, check out the South West corner of the lot and you will find ECSC and probably Barry if 
you look around. He's the bearded guy with the hat. If he doesn't have a deal for you, he'll tell you who does. Talk to this guy and if he 
helps you, buy something from him- Hey, he's still got to make a living and information is worth $$$. 

**UPDATE** At the tune of the writing of this article, Barry was alive and well. Unfortunately, he has since passed and his kids are 
now running the business. We're all very sad to see Barry go. 




TEL (714)871-1020 

Type: Retail/Surplus 
Contact: None 

Orvac is one the of the places I first explored in the 80's. I found this place to be quite exciting at the time. While they are a fully 
stocking retail store, they also have a surplus section. Yes, it's gotten smaller over the years, but they still have one. They mostly have 
connectors and switches in the surplus section, but from time to time other obscure items show up like transformers, displays (LCD, LED, 
etc). I have bought many loads of connectors from these people for less than wholesale over the years. They have been a great backup 
source since the day I first found out about them. Once upon a time, they used to sell grab-boxes, much like the ones Radio Shack used to 
sell in the 70's - but MUCH larger,, and only $1 a box. The amount of goodies was massive. Anyhow, check them out because they're 
still useful and have the potential to make anyone some money. 



TEL (714)530-0555 

Type: Retail/Surplus 
Contact: None 

This is another retail location who has a surplus section, What I find unique about this place is the amount of surplus flyback 
transformers they manage to come up with. They buy from a source (Electronics Warehouse in Riverside - mentioned below) for some of 
the surplus they sell, sometimes the prices are better than that of Electronics Warehouse. Either way, they have a good selection of 
vintage parts for less than wholesale- This one rates a 4 out of a 10 on my scale, but it's still useful overall. 




TEL (714)521-8080 

FAX (714)521-8920 



Type: Retail/Surplus 
Contact: None 

I've been buying from them from these people since the 70's. They have a full retail store intermingled with surplus parts. Just about 
everything is a surplus part and entitles you to wheel and deal with them. I once picked up a load of roughly 15,000 thousand each of 7 
different types of bridge rectifiers. These each sold for $5+ retail at the time, but I paid less man $0.01 per piece. I've been selling these 
off for $5-$20 each for the last 1 8 years and I dont see any end to my supply anytime soon! They have a section with old electronic junk, 
too - 1 found a few items with Intel 4004 boards inside them - with socketed "gold" C4004 and support chips on each board. I paid $5 per 
unit and walked away with a smile. There are still deals like this to be had at this place. They always talked to me about their 
overstocked "warehouse" which I never made the time to make an appointment to visit, but it sure sounds like the place to be. I'm still 
considering checking this warehouse out someday just out of curiosity (I'd be able to write about it, then). Anyhow, this place has some 
excellent deals on old parts - they have a BIG chip supply, so ask them if they have what you're looking for - it can't hurt. 

2960 W. BALL ROAD 
ANAHEIM, CA 92804 

TEL (714)828-1310 

Type: Retail/Surplus 
Contact: Larry 

This one is a mom and pop operation which has been around longer than most electronic stores. I have mixed feelings about this place, 
but they're worth the mention. They have a surplus section which takes up a good portion of their store - in this surplus section, they have 
connectors, caps, diodes, switches, displays, sockets, scrap circuit boards, old junker equipment and hardware parts. It's really kind of 
interesting. The guy who runs the place is a bit moody and his prices fluctuate ... in fact, he's downright difficult to hagle with, but I find 
that persistence prevails with him. Just keep on top of it and he'll cave in., .eventually. I once bought a large pile of circuit boards 
(roughly 1 50 of them) from this place. Each board was riddled with piles of socketed logic, gold plated CPU chips, and RAM chips 

Blacklisted! 411 Volume 6 Issue 3 - Summer 2004 47 

(41 16, 21 15, 61 16, etc). I paid $0.50 per pound and walked away with another excellent deal. No need to haggle with him on this one. 
He said the price and I paid. I had no idea what I really stumbled upon until I looked everything over a week later. Come to find out, I 
had picked up a pile of Ohio Scientific 500 and 600 series boards. You know, vintage computer boards which just happened to be highly 
collectable. Score! They have a somewhat decent selection of old chips and vacuum tubes. Check them out. 


TEL (909)686-6186 

Type: Retail Store + Additional Surplus Store 
Contact: None 

Ok, here's the scoop on this one. It's two stores right next to each other. One sells mostly newer retail product and the other is a shack 
and sells the surplus, excess stock items. You want to focus on the "shack' 1 . Take the time to look this place up and down. Fve found 
everything from rare connectors which were worth $25 each for my cost of $5 per box.. .to crates of arcade game parts - new old stock 
ATARI and BALLY/MIDWAY stuff for $10 a crate. This place is WORTH a look now and again. 

3301 S. HARBOR BLVD #108 

SANTA ANA, CA 92704 
TEL (714)979-1834 

Type: Retail/Surplus 

Contact: None 

This is another retail store. They used to have an excellent surplus section, but they moved recently and the surplus section is now small. 
I once purchased 4 truckloads of connectors, electrolytic caps (excellent quality, too) for a total of $400. These people have connections 
for decent deals on particular connectors and pins as well as a source for information on the whereabouts of other people in the business. 
I'm not sure what they're up to now, but I though I'd mention them since they were such an excellent source in the past 



TEL (818)904-0524 
FAX (818)781-2653 

Type: Retail/Surplus 
Contact: None 

They have a couple of stores and a web site. Make sure you get one of their catalogs and visit their stores. You will find an incredible 
selection of surplus parts arranged in a semi-retail format. They will deal, so find something of interest and make an offer. Buying in 
bulk is the key to getting rock bottom prices here. I found boxes of these small power inverters. They were a few cents each and came in 
boxes of 96 units. I resold them at $2 per unit Not the best deal overall, but I resold a ton of them in one lump, so it was worth the time 
and effort. They have a great selection of connectors and chips. Go up to the desk and ask them if they have what you're looking for. 
They just might. You'll pay less than traditional retail, but more than wholesale. Still a great price! 


Electronics £ Computers Surplus City 

EIO Is a versatile electronics surplus source 
associating Information with the distribution 
of electronics, computer and 
optical materials. We have implemented 
Interactive via e-mail, technical forums on 
Liquid Crystal Displays, Charge Couple 
Devices, Stepper Motors, Lasers, Leser Light 
Shows, Microcontrollers, Holography, Fiber 
Optics, Electro-Optics and ECSC Products 
with many more forums to come. We boldly 
supply links to competitors, revealing 
alternate and additional sources of surplus 
electronics, along with providing a rich 
listing of information on events (trade shows, 
| swap meets, conferences, etc.) and 
resources such as web sites, magazines, 
newsgroups, end Information of Interest to 
the technologically Inclined. 

Be sure to check us out at: 

Electronics and Computer Surplus City 

P.O. Box 1416, Redondo Beach, CA 90278-1416 

FAX:(310) 370-4462 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 


Is proud to announce that our website is now officially 
open for business. 

That's right! It's ONLINE! The website is fully functional, 
allowing visitors the opportunity of reading about our history and 
FAQ, learning where they can find our magazine and finding out 

how they can participate. Further, we have an announcement 

section where we will list any recent news as well as a guestbook 

which will give everyone the chance to leave their own comments. 

Last but not least, our online store is ready and awaiting your 

order. We have available to our readers both back issues as well as 


Please visit our website: 



Started in October 1983 as a disk based hacker underground 

magazine (e-zine), Blacklisted! 41 1 is one of the oldest of the 

hacker quarterlies available today. Blacklisted! 41 1 has a mix of 

the cheerfully basic for the "newbies" who have recently joined the 

ranks of the hacking community as well as the technically 

advanced for the experienced hacker. Our effort to appeal to all 

levels of hackers has not gone unnoticed. In fact, we've been 

branded "newbie friendly" by several sources which is generally an 

accomplishment of the impossible kind. Our official Blacklisted! 

41 1 website is intended to complement our print magazine and 

provide the hacker community with an additional resource. Get 

online, look around, and join us as we continue to serve the hacker 

and underground community. 

Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


The Timeline of the Mac Underground 

By: Ender- (Reid Huyssen), 16 ( 
from Writing Team 



If you picked up a newspaper a little over 20 years ago, you would see an ad for the beloved Apple computer. "Byte into an 
APPLE for only $666.66" is how the ad read. It is rumored that Steve Jobs has some help coming up with this clever catch 
phrase. A man that went by the name "Captain Crunch" helped him to conjure up the tag line. For those of you who haven't 
heard of Captain Crunch, he was one of the first well known phreakers/hackers who opened his Captain Crunch cereal one 
morning only to discover that the small plastic toy whistle that came with the box made a pitch that registered at 2600 Hertz. 
A very key tone that could be used to gain access to free phone lines. Legend has it that Jobs and Crunch sold "blue boxes", 
a tool used to generate tones made by coins in a pay phone. As you can see, ever since the very beginning, the Macintosh 
hacking and underground world have intertwined with the growth of Apple, and the computer world. One could say that the 
two worlds feed off of each other. 

Kevin Mitnick, one of the greatest crackers of his time, put the growth of the computer industry into perfect perspective. 
Mitnick, after his hefty jail time with out a computer, was allowed a computer with Internet access to write his book. He was 
confronted with an every day common Java piug-in warning when he tried to access his own web site. The man had no idea 
what to do, no clue to what the Java plug-in was, or how to get it. Mitnick's display shows the huge amount of change the 
computer industry has undergone, and therefore, the Mac Underground Scene. The two worlds have grown over the years 
almost at the same explosive rate. 

Recently, in the last few months, the Macintosh underground has had a growth spurt. Something that will rival that of the 
growth of the computer industry. I'm not talking about a Senior year breaking six feet tall. I'm talking about a huge spike in the 
amount of people that are asking questions, posting at forums, and visiting underground sites. Web administrators at 
underground sites are scrambling to find new hosting that will stand the huge increase in hits I now spend more time talking 
with people about hacking and security and answering tech forum questions than I ever have before. Blacklisted! 41 1 has 
returned just in time to usher in a new time of excitement for the beloved underground. 

Some people look at the increase in interest in the Mac underground scene as a problem. Those are the people that believe 
the scene should be reserved for veterans and exclude all new comers. I don't think this the way it should be. I feel that the 
future must be shaped today, and members of the underground scene should welcome these newcomers with open arms. 
The exponential growth of the underground should be seen as the great opportunity that people have been waiting for. 
Teaching, learning, experimenting, and experiencing have become the major focuses of the underground community. I cant 
think of a better way to make the community stronger than to focus on those four fields, which are also essential to the life of 
the community. The Macintosh Underground Scene has grown so much over the past few decades, and the community 
formed by that scene has grown as well. 

What's so special about this growth, you might ask, why is it so important? Pick up a recent magazine and mere is a 90% 
chance that you will have the answer in your hands. I went down to the bookstore and took a tally of the amount of 
magazines over the last month that had an article that related to hacking, the underground, viruses, or so called "E -Infectors". 
9 out of 10 of the magazines had such articles. One article included a picture of a teen with a lip ring. The caption read 
"Know what he does when he's feeling creative? He writes the kind of code that could bring your world crashing down", New 
York Times Magazine. This picture and caption served as the prestigious front page, reserved for only the most important 
topic. The point? More and more virus writers, evil developers, and script kiddies have surfaced, giving the public a great 
fear. The word "hacker" evokes two different types of emotions from people in the world today. Fear, and awe. Some people 
would give you the occasional scorn, mostly the older generations. 

Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

The underground scene has become known to everyone who owns a computer. People are starting to lose that "computer 
geek" view on people, and now dish out respect, and maybe even jealousy for the type. The Blaster Virus source code was 
found by an 18 year old boy, who copied it, and purposely distributed it, causing several network infections. All this kid 
wanted to do was identify with hackers. Make an image for himself as one, make the world think he was one. Granted, trying 
to achieve this won him a nice jail sentence, but he wanted to be like the computer nerd he knew in high school, because 
recently, that image has been made, for lack of a better word, "cooler". 

The Macintosh Underground scene has grown from a fairly small following to a flourishing community that is united under 
common interests. It has gained the attention and interest of a wide range of people. From corporate giants to the family 
household, people are attracted to the scene like Florida flies to a porch light. Not only does this light attract one type of 
insect. It brings a huge community of living things to it. The boy on the cover of the New York Times magazine was sporting a 
Nine Inch Nails shirt, with several pierces on his face, and stringy dread locks. Turn into the magazine about 10 pages and 
you see a clean cut 17 year old from Madrid, a member of 29A, an elite virus writing group. A key element has made the 
underground develop quickly, and that key element is variety. The image of a computer geek has been rapidly changing, and 
now it is almost un-definable. Those old corny jokes from the computer related "For Dummies" books referring to those 
"dorky computer guys" no longer apply. Variety has become such a central role in the underground, mat it depends on 
contributions that vary just as much. Questions, source codes, fixes, and comments have become more numerous, because 
of the variation in the people and their interests. I'm in awe of what is going on in the underground scene. It has come so far 
since its beginning, and I await to see what happens next in the story. 

It isnt fitting to put the growth of the underground community to a time line, because it deserves so much more than a line on 
paper. Rather, It is a fire that has burned since the beginning. At first a small spark, it has grown to be a blaze that attracts 
many people to what it has to offer. Every fire needs fuel, and that is exactly what you, the readers, the people of the 
underground, provide. You prevent the fire from dying with your contributions and your desire for more. So keep the fire going 
for those yet to come, keep doing what you have always done, and the fire of the future of the underground community will 
burn forever. 

About the author: 

Reid Huyssen a.k.a "Ender" is 16 and has been with the Mac Underground since he was 9. The total Mac converts that he 
has gained since the beginning of his Underground association is 10 people. He has written many web site reviews, tutorials, 
articles, and columns over the years. He spends most of his time doing technical support for friends, and coding his creations 
on Slackware Linux. He hopes that his contributions will be lasting and helpful to the entire Underground community as a 

About the UndergroundMac Writing Team: 

The purpose of the UnderG round Mac Writing Team is to teach and preach to the Mac Underground. We will learn from the 
past, improve the present, and ensure the future. Our goal is to "Share the Knowledge" to anyone willing to benefit from this 
knowledge. We will teach without prejudice or discrimination. We aim to entertain questions and comments from people of all 
levels of experience, and provide quick, understandable solutions and responses. We will spread knowledge and information 
for the sole purpose of improving and adding to the Mac Underground Community. We are the UGM Writing Team. 

SkK Itsues Nw Available 

/ Yes, you read that right. A complete set of back issues of Blacklisted! 411 is now available for 
purchase. Everything from Volume 1 through Volume 5 is currently in stock and ready to ship. If you 
missed out on any of these in the past, now's the time to take action and finish off your collection. 

Our early Volume 1 issues portray a hacker scene not known to many, especially the new hackers of 
today. It was a different time back then and an unusually large number of hackers would routinely 
gather in one place to party and exchange information unlike anything you will see today with the 
exception of the large hacker conventions. The atmosphere was much more "open" and everyone felt 
comfortable being themselves. Buy your back issues TODAY! 

Blacklisted! 411 

Volume 6 Issue 3 ■ Summer 2004 


Replica I - 

Have you ever wondered what Apple made before the Apple n? If you assumed it must have been the Apple 1, you were right. Very 
rare and highly sought after, the Apple I computer is a tough item to get ahold of. Running on 6502 processor at 1 .023Mhz, sporting 4K 
RAM and available only as a single board (no keyboard, no case, etc), the Apple I was developed by Steve Wozniak in his bedroom. 
Originally sold for $666.66 in 1976, recently a few Apple l's have popped up, selling for as much as $50K! If you can't tell, people 
really want one of these, myself included! In an effort to create a low cost version of the Apple I people could actually use without fear of 
destroying a multi-thousand dollar unit, Vince Briel of Briel Computers created a replica of the Apple 1 . Cleverly named "Replica I", you 
can finally get your hands on a working Apple I. ..clone! Available for as little as $129 or as much as $199 (plus shipping and OHIO tax), 
you'll have to provide your own case, keyboard, power supply and monitor. Site is complete with pictures, links, a forum and system 
information. Welldone. Now, I'm going to go get one of these for myself. Look, foe a review in a future issue of Blacklisted! 411. 

Joe Cartoon - 

Looking for some new cartoons to watch? This is an interesting site full of flash cartoons. The newest cartoon is titled, "Gerbil in a light 
socket". In fact, most of these are related to bugs, animals, frogs, etc in some way. They're actually pretty funny. I've found myself 
wasting time watching these from time to time. The site is nicely done and very easy to navigate. (Note: Requires FLASH to view) 

Nothing So Strange - 

A website selling an insanely realistic mock documentary (on DVD, by Brian Flemming) about the assassination of Bill Gates. Yep. You 
read that right! This mock documentary is so well done, it's actually confused people into thinking Gates was *reaily* assassinated! The 
site is very well done and includes many links to support the background of the documentary, making the site even further believable. 
The site includes information on how to purchase the DVD directly from them, press information, clips, a diary, links, etc. I recommend 
this to everyone simply because this creatively strange idea was executed without flaw. Very, very well done. 

TechTales - 

Have you ever worked tech support before? Some of us over here have in the past and we know all about the crazy calls that come in 
every day. Some are so incredibly odd, we remember them for a lifetime. We tell them to others in passing from time to time as a 
conversation-making topic. We laugh about them when we're alone with our thoughts. We generally have only a few outlets to pass 
these stories onto others. That was until now. . . . Anyhow, the "Tech Tales" site provides a place for current and past tech support folks to 
tell their tall tales of wacko support calls. Interestingly enough, there are tech tales from as far back as 1997 available on the site! If you 
have a tale, you can submit it. Take a few minutes and check out this site. It's worth a look if I do say so myself. 

Open Diary - 

Strange, would YOU allow the world, possibly, know the intimate details of your personal diary. Well, a lot of people seem to think it's 
cool to let everyone in on their most private thoughts. This site contains the ramblings of over 286,000 people who keep a semi-regular 
diary of their daily lives, jotting down personal thoughts and secrets. Some of these are "private" and some are "public". The public ones 
are what we're focusing on here. The cool part is that *anyone* can come along and read those writings whenever they feel like it. You 
can do author searches by name, age or geographical location, read random or recent entries or just browse around. It's really very 
interesting. There's even the ramblings of a few hackers. 

White Box Robotics - 

Do you remember the Heathkit HERO, a cool little robot from the 80's that you could construct yourself and use. White Box Robotics 
has made the equivalent robot for the new millennium, called the "912". Their target is a cross-over of PC enthusiast and tradition robot 
builders. They've built several concept robots to showcase the possibilities and applications for this line-up. For instance, they have the 
"MP3" multimedia robot, the "HMV" security robot and the "ARSENAL" and "COMANCHE" military concept robots. Available for 
purchase this summer, the 912 will sporta VTA mini-ITX motherboard running Windows OS. For its robotic functions, such as motion or 
obstacle avoidance, the 912 uses Evolution Robotics Robot Control Center software, The 912 will be available as a kit form as well as 
pre-assembled units for the less-technically inclined people. The site is complete with pictures, descriptions and a press kit. No pricing 
has been set as of the date of this writing. 

Earth Exploration Rover Mission - 

A humorous site which makes fun of the Mars Rover mission. They've gone to a lot of trouble to make the site realistic, yet funny. 
Complete with pictures, status reports and video footage, it's worth a quick look. Well done. 

New Grounds - 

Hey, this is a cool site with some games, movies, simulators, ezines and a forum. I happen to like "Crimson Warfare" - it's a war strategy 
game. You can build soldier, tanks, a defense base, etc. It's fairly cool for a simple game if you're in need of wasting a few minutes. 
Warning, this site may be offensive to some people. 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 


Your Electronic Hobby / Repair Source list 

| Here's a small list of new and surplus electronics sources you may find useful If you're trying to build a project or repair a 
< piece of equipment. We've done business with all of these companies and personalty recommend them to anyone. Don't 
{jarget to mention where you heard about them. If you want a company listed, contact us. 

Action Electronics 

1300 E Edinger Ave # B, Santa Ana, CA 9270S 



Advanced Computer Products 

1 310 E Edinger Ave # A. Santa Ana, CA 92705 



Adtech Electronics 

1 300 E Edinger Ave # D, Santa Ana, CA 92705 


American Design Components 

400 Country Ave., Secaucus, NJ 07094 


Ball Electronics 

2960 W Ban Rd, Anaheim, CA 92804 


Bob Roberts 

California Electronic & Industrial Supply 
221 N Johnson, El Cajon CA 92020 


Circuit Specialists 

P.O. Box 3047, Scottsdale, AZ 85271-3047 


DC Electronics 

P.O. Box 3203, Scottsdale. AZ 85271-3203 



Electronics Warehouse 

2691 Main St, Riverside, CA 92501 


Ford Electronics 

8431 Commonwealth Ave, Buena Park, CA 90621 



Future-Bot Components 

203 N. Pennock Lane, Jupiter, FL. 33458 


Gt Electronics 

P.O. Box 11029, Westminster, CA 92685 


Hi-Tech Surplus 

605 #. 44th St, Boise ID 83714 

<208) 375-7516 

Hoffman Industries 

853 Dundee Ave., Elgin, IL 60120 


International Components Coporatlon 

1803 NW Lincoln Way, Toledo OR 97391-1014 

(800) 325-01 01 

JGL Components, Inc. 

455 Aldo Avenue, Santa Clara, CA 95054 



Johnson Shop Products 

P.O.Box 1601 13, Cupertino CA 95016 

(408) 257-8614 

Just In Time IC-s 

4450 Enterprise St #113, Fremont. CA. 94538 



Mark Capps 

1842 Chrysler Dr Atlanta, GA 30345 

Ocean States Electronics 

PO Box 1458, 6 Industrial Drive, Westerly Rl 02891 


Orvac Electronics 

1645 E Orangethorpe Ave, Fullerton, CA 92831 


R-Vac electronics 

23684 El Toro Rd # O, Lake Forest, CA 92630 


RA Enterprises 

2260 De La Cruz Blvd., Santa Clara, CA 95050 

(408) 966-6286 


Sav-On Electronics 

13225 Harbor Blvd. Garden Grove, CA 92843 


Skycraft Parts & Surplus Inc. 

2245 West Fairbanks Ave, Winter Park, FL 32789 


Weird Stuff Warehouse 

384 W. Caribbean Dr. , Sunnyvale, CA 94086 


Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 

ffijnd j^jctnipulation &L^Qnrf (jontrol: 

Part 2 of a 2 part series 

Welcome back to the second installment of this 2 part series. In the last issue we looked at the history of mind control, some 
of the programs, some of the parties involved, and we examined "mind dancing," or psychological warfare techniques 
according to Dr. Lung. I closed with a few mind trix you could add to your own repetoire. In this installment we will look more 
closely at mind control and how it is being applied today, overtly and covertly. In fact, were just gonna put MC under a 
microscope an examine as much as we can about it because I believe this technology is being used and abused, and will 
probably become more common in the future. I for one, would like to know how to protect my "mind-castle" from such a threat 
if possible. We will also look at more "mind-dancing" techniques, PSYOPS; or psychological operations, its history and some 
fascinating examples of its use, and we'll peep out kinesics to find out what other peoples bodies are telling us. 

Am you ready? Then lets do this. 

So far we've examined MC (MC = mind control) from an academic point of view. 

I touched on the fact that there are devices and technology being used, in addition to drugs, hypnosis, subliminal messages, 
and so-called "brainwashing" techniques. Interestingly, the term "brainwashing" was first coined by Edward Hunter in 1950. 

Operating undercover as a journalist, Ed was a CIA employee. The term purportedly explains how American POWs in Korea 
were being coerced into confessing they used biological weapons. Newspapers played up fears that the Soviets, the Chinese 
and North Koreans were using a secret psychological weapon against allied soldiers. This "brainwashing" scare was a 
successful CIA disinformation strategy used to build support for an unpopular war. 

It also helped insulate the military from accountability for violating medical ethics and criminal laws. Where was I? Oh yes, I 
was about to peep out MC technology currently in use today, despite the fact that many people, probably most people, refuse 
to believe its even possible, or simply science fiction. 

The technology exists. It is constantly being researched & developed. And unfortunately for us, it is also being covertly tested 
on individuals to further refine its capabilities. Who would test it on civilians? The military, the army, the navy, the NSA, and 
their pals at the CIA to name the most likely responsible. Even NASA is getting in on it. Now for those that think this is a lot of 
sci-fi quackery and I'm just a paranoid, younger, cooler and more handsome Dale Gribble. .. 

I've located and present here in its entirety, an article that appeared in the Washington Times on August 17, 2002 

NASA plans to read terrorist's minds at airports 

by Frank J. Murray 

Airport security screeners may soon try to read the minds of travelers to identify terrorists. Officials of the National 
Aeronautics and Space Administration have told Northwest Airlines security specialists that the agency is developing brain- 
monitoring devices in cooperation with a commercial firm, which it did not identify. Space technology would be adapted to 
receive and analyze brain-wave and heartbeat patterns, then feed that data into computerized programs "to detect 
passengers who potentially might pose a threat," according to briefing documents obtained by The Washington Times.NASA 
wants to use "noninvasive neuro-electric sensors," imbedded in gates, to collect tiny electric signals that all brains and hearts 
transmit. Computers would apply statistical algorithms to correlate physiologic patterns with computerized data on travel 
routines, criminal background and credit information from "hundreds to thousands of data sources," NASA documents say. 
The notion has raised privacy concerns. Mihir Kshirsagar of the Electronic Privacy Information Center says such technology 
would only add to airport-security chaos. "A lot of people's fear of flying would send those meters off the chart. Are they going 
to pull all those people aside?" The organization obtained documents July 31, the product of a Freedom of Information Act 
lawsuit against the Transportation Security Administration, and offered the documents to this newspaper. Mr. Kshirsagar's 
organization is concerned about enhancements already being added to the Computer-Aided Passenger Pre-Screening 
(CAPPS) system. Data from sensing machines are intended to be added to that mix. NASA aerospace research manager 
Herb Schlickenmaier told The Times the test proposal to Northwest Airlines is one of four airline-security projects the agency 
is developing. If s too soon to know whether any of it is working, he says. 'There are baby steps for us to walk through before 
we can make any pronouncements," says Mr. Schlickenmaier, the Washington official overseeing scientists who briefed 
Northwest Airlines on the plan. He likened the proposal to a super lie detector that would also measure pulse rate, body 
temperature, eye-flicker rate and other biometric aspects sensed remotely. Though adding mind reading to screening 
remains theoretical, Mr. Schlickenmaier says, he confirms that NASA has a goal of measuring brain waves and heartbeat 
rates of airline passengers as they pass screening machines. This has raised concerns that using noninvasive procedures is 
merely a first step. Private researchers say reliable EEG brain waves are usually measurable only by machines whose 
sensors touch the head, sometimes in a "thinking cap" device. 'To say I can take that cap off and put sensors in a doorjamb, 
and as the passenger starts walking through [to allow me to say] that they are a threat or not, is at this point a future 
application," Mr. Schlickenmaier said in an interview. "Can I build a sensor that can move off of the head and still detect the 
EEG?" asks Mr. Schlickenmaier, who led NASA's development of airborne wind-shear detectors 20 years ago. "If I can do 
that, and I don't know that right now, can I package it and [then] say we can do this, or no we can't? We are going to look at 
this question. Can this be done? Is the physics possible?" Two physics professors familiar with brain-wave research, but not 
associated with NASA, questioned how such testing could be feasible or reliable for mass screening. "What they're saying 

54 Volume 6 Issue 3 - Summer 2004 Blacklisted! 41 1 

they would do has not been done, even wired in," says a national authority on n euro-electric sensing, who asked not to be 
identified. He called NASA's goal "pretty far out." Both professors also raised privacy concerns. "Screening systems must 
address privacy and Big Brother* issues to the extent possible," a NASA briefingpaper, presented at a two-day meeting at 
Northwest Airlines headquarters in St. Paul, Minn., acknowledges. Last year, the Supreme Court ruled unconstitutional police 
efforts to use noninvasive "sense-enhancing technology" that is not in general public use in order to collect data otherwise 
unobtainable without a warrant. However, the high court consistently exempts airports and border posts from most Fourth 
Amendment restrictions on searches. "We're getting closer to reading minds than you might suppose," says Robert Park, a 
physics professor at the University of Maryland and spokesman for the American Physical Society. "It does make me 
uncomfortable. That's the limit of privacy invasion. You cant go further than that." "We're close to the point where they can 
tell to an extent what you're thinking about by which part of the brain is activated, which is close to reading your mind. It 
would be terribly complicated to try to build a device that would read your mind as you walk by." The idea is plausible, he 
says, but frightening. At the Northwest Airlines session conducted Dec. 10-11, nine scientists and managers from NASA 
Ames Research Center at Moffett Field, Calif., proposed a "pilot test" of the Aviation Security Reporting System. NASA also 
requested that the airline turn over all of its computerized passenger data for July, August and September 2001 to 
incorporate in NASA's "passenger-screening testbed" that uses "threat-assessment software" to analyze such data, biometric 
facial recognition and "neuro-electric sensing." Northwest officials would not comment. Published scientific reports show 
NASA researcher Alan Pope, at NASA Langley Research Center in Hampton, Va., produced a system to alert pilots or 
astronauts who daydream or "zone out" for as few as five seconds. The September 11 hijackers helped highlight one 
weakness of the CAPPS system. They did dry runs that show whether a specific terrorist is likely to be identified as a threat. 
Those pulled out for special checking could be replaced by others who do not raise suspicions. The September 1 1 hijackers 
cleared security under their own names, even though nine of them were pulled aside for extra attention. 

Now, if they can admit they can tell what your thinking, then it's a safe assumption that they can tell you what to think, ergo, 

Ok then, so there you can clearly see that the technology is here now, and whats not is either in the lab getting the bugs 
worked out, or is still classified, and simply wouldn't be released to the press before it was actually being used to full effect. 
You gotta be able to read between the lines.. .some sources didn't want to be identified. Some beat around the bush asking 
more questions than answering them. all points to what I'm saying. ..the technology is here and now, the only question is 
when will It be applied, how, and to what end? I can see a few possible useful applications, but I see way more potential for 

If you'd like to learn more about MC, its application, how to protect yourself, and everything else associated with it, including 
plans to build your own MC devices (dizzam!) then go here > http://www.tsc <http://www.tsc-global. 

We'll just have to sit back and observe the developments, you know I'll be watching... 

Meanwhile, back at the ranch. ..the Goldfinger is in the house and is gonna show you how to use your own mind to kick 
some mental ass, jedi style. 

In part 1 we looked at "mind-dancing" techniques, and the 2 step strategy for "storming the mind gate". Yes, I happen to like 
"wax-on, wax-off' type analogies and the "sensei, grasshopper" lingo so we will stick with Dr. Lungs style of teaching from his 
fascinating book; Black Science. 

Now we will look at how to gain insight into another's mind. 

There are 2 important factors. 

The first, is to explore the role of nature; in other words; genetics, gender, the time and circumstance of birth, etc. The 
second, we must examine the nurture factors; birth order, family relationships, and childhood trauma. Discern, then distort. 
Ninja mind masters adopted mind manipulation tactics from a variety of sources in addition to their own. Anything that is 
useful should be used. Remember: 'Your greatest weapon is in your enemies mind". -Buddha 

After discerning an individuals overall M.O., and his inherent weaknesses, ninja mind masters or sennin, then deployed a 
variety of kiai-shin-jutsu tactics to distort the victims world and eventually destroy him. 

I'm not advocating destroying anyone, but the more you know about your enemies, the less likely you are to be put in a 
situation you can't handle. 

Some of those kiai-shin-jutsu tactics include: In-yo-jutsu, which is the Japanese version of the Taoist concept yin-yang 

The theory behind this is to throw an opponent off balance by making him doubt himself and distrust his family and 
associates. Take him from a black and white way of looking at the world to a clouded gray area where his trust in others and 
self confidence are in decline. 

Amettori-jutsu (man of straw) Utilizes all tactics and techniques of deception. The name comes from the ploy of using a 
scarecrow to make an enemy think it's a real soldier. 

Jomon-jutsu consists of the use of special words and phrases designed to affect an individuals emotional stability. Words that 
evoke fear, lust, hate, or patriotism. 

Speaking of "power" words... 

If one was so inclined, one could also study and master NLP, or neuro-linguistic programming to obtain an even greater edge 
in communications. NLP is something of a science, something of an art Depending on who you talk to of course. Its not just 

Blacklisted! 411 Volume 6 Issue 3 - Summer 2004 55 

what you say, its how you say it is the best way I can think of to describe NLP without writing another 6 page article. 

Theres a ton of information on the internet about NLP. 

From what I've seen, most people use it for one of 2 things. Seduction, and negotiating. 

The runner up would be advertising and marketing. 

NLP is a powerful toot, and if used properly can be very beneficial to the practicing mind master. 

Another technique is called Yugen-shin-jutsu or (the Mysterious Mind). This technique utilizes various methods of hypnotism 
and subliminal suggestion to influence and control others. 

Finally, there is Kyonin-no-jutsu which plays on a persons superstitions. Even simple old wives tales like the belief that 
getting caught in the rain causes illness can be exploited. 

"A keen insight into human psychology and predictability has always proven the ninja's greatest weapon. This remains true 
today." - Dirk Skinner, Street Ninja 

Modem psychology confirms what ancient martial artists, shamans, soothsayers an the like deduced intuitively: that people 
either have a positive or negative outlook on life, that people have different motivations for their actions, and that all people 
function at different levels of awareness and understanding. Mind masters realize with the quickness that despite all our 
uniqueness, all our seeming differences, were all very similar. How we think, how we talk, our body language, all make us 
susceptible to the black science of mind slayers. Those who are masters at manipulating those fears and secrets know that 
before one can influence and control a foe, one must determine how that foe views the world. Is the subject pessimistic or 

Is he internally or externally motivated? Does he have true self-worth or does he define himself by external devices such as 
racial identity, cult or gang affiliation? The latter are superficial factors that are easily manipulated. Does he feel in control of 
his destiny or does he see himself as a victim, and at the mercy of his environment? What myths, excuses, and defense 
mechanisms does he/she cling to? The list goes on and on, but you get the idea. 

For mind slayers, undermining a foes self-image and confidence is always the first goal. 

Once his confidence is undermined, the walls of his "mind-castle" come crashing down. 

A lot of our identity comes from interaction with others. Thats why cults and dictatorships always attempt to limit access to 
outside sources of information and to restrict contact with anyone other than approved cult followers. Some of us identify with 
positive family role models like parents or other relatives. Some model after teachers, coaches, or religious leaders. 

Others imitate cultural hero's and even celebrities. Some adopt "anti-identities" by emulating criminals and by joining cults. 
Cults and gangs usually attempt to further isolate new recruits by giving them new names, new language, and new clothes to 
further separate them from non-cult/gang members. Ready made identities like these can be seductive, especially to the 
young and those that lack strong role models. How we react to people and situations is to a great extent a repeat of our past 
reactions. We tend to repeat these same reactions over and over. 

This establishes our identity. The first time we encounter a sensation our brain records its initial reaction and files it away for 
future reference. In subsequent encounters with similar sensations, we recall the past sensation/reaction to help determine 
our present reaction. 

Our identity is like a record of past reactions. Knowing that past reactions make up the bulk of a foe's identity, the mind slayer 
will try to learn all they can about a targets past behavior. 

This makes it easier to anticipate and manipulate a foe/victims future behavior. 

Here is an example of this in practice. 

Mind Trick #3 : 

Lets say you know someone that is planning on doing business with one of your competitors. 

After applying the 2 step method of discerning, then distorting, you discover that this person has musophobia, or a fear of 
mice and rats. Before this person meets wtth your competitor for the first time, you have a conversation with him/her where 
you subtly (but repeatedly) mention the fact that your competitor's dome-piece (toupee/wig/rug) looks "small and furry". If 
homie lacks a toupee, then you focus on something else, like how he has "ferret-like eyes", or how his eyes are "small and 
beady". Use other rat-like adjectives to describe your competitor. 

This creates an association in the mind of the person linking his/her fear with your competitor. 

Effective, yes. Exploitive, perhaps, but in business, any advantage must be utilized, as well as in "love and war". 

Finally, no discussion of manipulation or MC would be complete without looking at the "shadow language" or body language. 
Kinesics is the science of non-verbal communication. Using kinesics, one can analyze the common gestures we use and 
observe every day. Its been estimated that as much as 70% of all communications between people is carried on without the 
use of words, Even when we do use words to communicate, a lot more is being conveyed by our tone, patterns of speech, 
and the type of words we favor. Mind slayers call this the "shadow language". They learned this so they could guard 
themselves, and to better manipulate others. Modem self-defense experts know the importance of body language and 
recognizing it to protect themselves and to project an "attitude" of confidence to dissuade attack. 

56 Volume 6 Issue 3 - Summer 2004 Blacklisted! 411 

The Face: The Kama Sutra says that If you really want to be good at manipulating others you must study "the art of knowing 
the character of a man from his features". Most of us can spot the 10 basic emotions on someone's face: joy, anger, interest/ 
excitement, disgust, surprise, sadness, contempt, shame, fear and guilt. Hands "tell" a lot too. Are the fingers drumming in 
impatience? Are the hands wringing because your worried? Are the knuckles clenched white because of stress or anger? 

All these non-verbal cues are called "tells", or unconscious signals we all give off. Easy to spot "tells" include blushing (guilt, 
embarrassment), lying (fidgeting, sweaty palms) and signs of fear (pale face, trembling). Other "tells" include changes in 
breathing, eye contact or lack of, and physical tension. Some speech "tells" include stuttering, hesitating, and my favorite, 
Freudian slips of the tongue. When one can guard and control their own non-verbal cues, they are less likely to give up the 
advantage to someone who can read them. 

According to Dr. Edward H. Hess, there is an unconscious widening of the pupil when the eye sees something pleasant. This 
could be a tremendous asset in a poker game if the player is in the "know". When his opponents eyes widen, he can be sure 
he is holding a good hand. 

Of course, some people develop this skill naturally, they don't know why, they just can. 

A good example of this is the card player in the movie Lock, Stock, and 2 Smoking Barrels. 

Dr. Hess has found that the pupil of a normal mans eye becomes twice as large whe he's sees a picture of a naked woman. 
Thats not the only thing doc. *wink* 

Some arab business men know this as well, and wear dark shades when negotiating with others so as not to tip their hand by 
displaying interest when their pupils dilate. 

Casual conversation distance between talkers is 3 to 5 feet Closer than this is called intimate distance and indicates either 
confiding in or conspiracy conversation. Americans are generally more space and distance defensive and less touch oriented 
than other cultures. 

Many Middle Easterners for example tend to stand closer when talking - close enough feel another's breath on their face 
(and to note one another's breathing patterns) and to read another's eyes. Probably the most beneficial technique the 
uninitiated could learn, is Mirroring. 

This is not so much a mind trick, as it is a strategy. Almost anyone can benefit from this so pay attention. When you generate 
comfort and trust in others, they become more receptive to your ideas and are more willing to help you accomplish your 
goats. Establishing rapport is like a doctors "bedside manner", or a Jehovah's Witness "getting a foot in the door", the mind 
slayer calls it Mirroring; or "the beginning of the end". To establish rapport you must pay close attention to the person in 
question. Whether he is a potential customer, or an enemy, you need to listen to what he says, and also how he says it. 
Watch his body language, and how he sits. 

When sitting with him, sit with your legs stretched out, elbows away from your body. 

Don't sit with your elbows close to your body and your knees together. Smile. 

Smiles are disarming. To spot a fake smile realize that they are usually switched on abruptly and are held longer, like 4-5 
seconds. Always make direct eye contact and begin mirroring the person you are trying to persuade. Adjust your gestures, 
tempo, and tone of your voice to match his. 

Imitate his movements and body positioning. Be careful not to appear like your mocking him. 

Pepper your speech with his favored phrases. Once you determine if he is a watcher, listener, or a toucher, you can insert 
the appropriate terms. Watchers; "I see...". Listeners; "I hear...". Touchers; "I fee!,..". The purpose of mirroring is to convince 
someone you are just like them. 

Once you convince them of this, once your in synch with them, you can begin manipulating the pace, tone and direction of 
the communication, and gently lead the conversation where you want it to go. To quote Dr.Lung, "The more attention we pay 
to the whispers of our enemies shadow language today, the better our chances to avoid hearing our own screams tomorrow!" 
This info can obviously be used in a number of ways, but be responsible, think what would ajedi do? Remember, the dark 
side never wins, it just looks really cool and gets maad chicks for awhile, but in the end, they always lose cuz "there ain't no 
future in yo frontin" beeatch. 


Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 


"' 'Kteirt,-"^-^" """' 


Interested in meeting up with some of the Blacklisted! 411 readers? We will list all hacker meeting information that i 
provided to us. We will list "Blacklisted! 411" only meetings as well as "independent" meetings open to all. 


(949 Area Code) - Irvine 

iHop - By Airport (Upstairs Room), 18542 MacArthur, Irvine, 

CA. 92714 - Meeting is not Blacklisted! 411 specific. The 

meeting date may change from month to month. 

For specifics, check here: 

Hosted by: Freaky 




Want to set one up? Contact us and give us your 
information in a similar format to the meeting info, listed 

We removed all of the hacker meetings we could not confirm were still in existence. If you're still running a meeting, 
contact us right away and we'll get you listed here on this page. 

If you are interested in organizing a new meeting in your area, please contact us, advising us of your interest, where 
you're located, where you would like to hold the meetings, etc. (Be sure to include your contact name, area code, 
city, state, day of month and time as well as a description of meeting location). Also include contact information for 
our use such as: name, phone number, address, email, etc. 





8-bjtSingle Board Computer Kits are back! 

The replica i is afunctional clone of the apple I computet, it indutfes a 85002 MCU running at tMHz UK RAM 
and 8K ROM with monitor built in. The replica has oust in video and the capability to use an authentic ASCit keyboard of 
more modem P5I2 keyboard. Simply add a standard PC styte AT power supply, keyboard and NTSC composite TV or 
monitor. Add the optional ssriai WO interface and you can store and toad programs from any PC Kits startat jyst $129_arsd 
assembled boards are just $199 

visit for more info 

replica 1 

BfW computer* 


Volume 6 Issue 3 - Summer 2004 

Blacklisted! 411 

Blacklisted! 411 Subscription Card v«« 

You can subscribe In any number of ways. Check by Phone, Check By Fax, Check via Mall, Credit Card By Phone, Credit Card via Mail, 
Cash, etc. There are many ways. We auggest you photocopy this coupon, fill It out and send It to ua In the mall with your payment option. 

) Please send me a 1 year subscription of Blacklisted) 41 1 (4 quarterly Issues) for $20 (Save $3.80 off newsstand price) 
) Please sand me a 2 year subscription of Blacklisted! 411 (8 quarterly Issues) for $38 (Save $9.60 off newsstand price) 
) Please send me a 3 year subscription of Blacklisted! 411 (12 quarterly Issues) for $54 (Save $17.40 off newsstand price) 

) My Check Is enclosed ( ) Money Order enclosed ( ) Bill my Credit Card: 
) MasterCard ( ) Visa ( ) American Express ( ) Discover 




. City:_ 



Exp Date:_ 




_(Required for credit card purchases) 

Please enclose this card in an envelope for privacy. Copyright 1994,95,96,97,98,99,00,01,02,03 Syntel Vista. Inc. Blacklisted! 411 is t 
Inc. Canadian orders add $8 U.S. per year. Other foreign orders add $16 US. per year. Please allow up to 10 weeks for deliver}' of fir 

Blacklisted! 411 Subscriptions, P.O. Box 2506, Cypress, CA 90630 

trademark of Syntel Vista, 
t issue. 

Blacklisted! 411 Back Issue Order 

We now have complete supply of issues from Volume 1 through volume 5 available for purchase. They're $6 each ($7 
Canada - $9 Foreign). Please allow 6-6 weeks for delivery of back issues. HURRY, while supplies last. 

[ ] Volume 1, Issue 1 -January 1994. Quantity: 

[ ] Volume 1, Issue 2 - February 1994. Quantity: 

[ ] Volume 1, Issue 3 -March 1994. Quantity: 

[ ] Volume 1, Issue 4 -April 1994. Quantity: 

[ ] Volume 1, Issue 5 - May 1994. Quantity: 

[ ] Volume 1, Issue 6 - June 1994. Quantity: 

[ ] Volume 1, Issue 7 -July 1994. Quantity: 

[ ] Volume 1, Issue 8 -August 1994. Quantity: 

[ ] Volume 1, Issue 9 -September 1994. Quantity: 

[ ] Volume 1, Issue 10 -October 1994. Quantity: 

[ ] Volume 1, Issue 11 - November 1994. Quantity: 

[ ] Volume 1, Issue 12 -December 1994. Quantity: 

[ ] Volume 2, Issue 1 - First Quarter - January 1995. Quantity: 

[ ] Volume 2, Issue 2 -Second Quarter -April 1995. Quantity: 

[ ] Volume 2, Issue 3 -Third Quarter -July 1995. Quantity: 

[ ] Volume 2, Issue 4 -Fourth Quarter -October 1995. Quantity: 

I ] Volume 3, Issue 1 -First Quarter -January 199S. Quantity: 

[ ] Volume 3, Issue 2 - Second Quarter - April 1996. Quantity: 

[ ] Volume 3, Issue 3 -Third Quarter -August 1996 Quantity: 

[ ] Volume 3, Issue 4 -Fourth Quarter -November 1996. Quantity: 

[ ] Volume 4, Issue 1 -First Quarter -January 1997. Quantity: 

[ ] Volume 4, Issue 2 -Second Quarter -April 1997. Quantity: 

[ ] Volume 4, Issue 3 -Third Quarter -October 1997. Quantity: 

[ ] Volume 4, Issue 4 -Fourth Quarter -January 1998. Quantity: 

[ J Volume 5, Issue 1 - First Quarter - April 1998. Quantity: 

[ ] Volume 5, Issue 2 -Second Quarter -Fall 1998. Quantity: 

[ ] Volume 5, Issue 3 -Third Quarter -Winter 1998. Quantity: 

[ ] Volume 5, Issue 4 -Fourth Quarter -Spring 1999. Quantity: 

[ ] Volume 6, Issue 1 - First Quarter - Winter 2003/2004. Quantity: 

[ ] Volume 6, Issue 2 - Second Quarter - Spring 2004. Quantity: 

Please photocopy this page, fill out the back issue form, indicating which issues you want and the quantity you desire. 
Enclose with payment (check, money order or cash). Be sure to include the name and address where you want the 
order shipped to. All orders are shipped in discrete envelopes or parcels. Send completed order form and payment to: 

Blacklisted! 411 Back Issues, P.O. Box 2506, Cypress, CA 90630 


Blacklisted! 411 

Volume 6 Issue 3 - Summer 2004 



Blacklisted! 4?? Maya 

e Official Hackers Magazin 

P.O. Box 2506 
Cypress, CA 90630